Difference between revisions of "SCN 2016"
Jump to navigation
Jump to search
(modified through wikirestore by orapi) |
(modified through wikirestore by orapi) |
||
Line 5: | Line 5: | ||
|has Keynote speaker=Aggelos Kiayias, Rafael Pass | |has Keynote speaker=Aggelos Kiayias, Rafael Pass | ||
|Acronym=SCN 2016 | |Acronym=SCN 2016 | ||
− | |End date=2016 | + | |End date=2016-09-02 |
|Series =SCN | |Series =SCN | ||
|Type =Conference | |Type =Conference | ||
Line 11: | Line 11: | ||
|State =IT/72 | |State =IT/72 | ||
|City =IT/72/Amalfi | |City =IT/72/Amalfi | ||
+ | |Year =2016 | ||
|Homepage=http://scn16.di.unisa.it/ | |Homepage=http://scn16.di.unisa.it/ | ||
− | |Start date=2016 | + | |Start date=2016-08-31 |
|Title =10th Conference on Security and Cryptography for Networks | |Title =10th Conference on Security and Cryptography for Networks | ||
|Accepted papers=30 | |Accepted papers=30 |
Revision as of 03:46, 19 November 2021
Event Rating
median | worst |
---|---|
![]() |
![]() |
List of all ratings can be found at SCN 2016/rating
SCN 2016 | |
---|---|
10th Conference on Security and Cryptography for Networks
| |
Event in series | SCN |
Dates | 2016-08-31 (iCal) - 2016-09-02 |
Homepage: | http://scn16.di.unisa.it/ |
Location | |
Location: | IT/72/Amalfi, IT/72, IT |
Papers: | Submitted 67 / Accepted 30 (44.8 %) |
Committees | |
General chairs: | Roberto De Prisco |
PC chairs: | Vassilis Zikas |
PC members: | Divesh Aggarwal, Shweta Agrawal, Joël Alwen, Gilad Asharov, Foteini Baldimtsi, Jeremiah Blocki |
Keynote speaker: | Aggelos Kiayias, Rafael Pass |
Table of Contents | |
Topics
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:
- Anonymity and Privacy
- Applied Cryptography and Implementations
- Authentication, Identification and Access Control
- Block and Stream Ciphers
- Complexity-Theoretic Cryptography
- Cloud Computing Security
- Cryptanalysis
- Cryptocurrencies
- Cryptographic Hash Functions
- Cryptographic and Security Protocols
- Digital Signatures and Message Authentication Codes
- Distributed Systems Security
- Formal Security Methods
- Information-Theoretic Security
- Network, Web and Wireless Security
- Public-Key Encryption
- Physical Cryptography
- Security Architectures and Models
- Software and Systems Security