Difference between revisions of "SCN 2018"
Jump to navigation
Jump to search
(modified through wikirestore by orapi) |
(modified through wikirestore by orapi) |
||
| Line 16: | Line 16: | ||
|Title =11th Conference on Security and Cryptography for Networks | |Title =11th Conference on Security and Cryptography for Networks | ||
|Accepted papers=30 | |Accepted papers=30 | ||
| − | |Submitted papers=66}} | + | |Submitted papers=66 |
| + | }} | ||
==Topics== | ==Topics== | ||
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to: | All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to: | ||
Latest revision as of 04:25, 6 December 2021
Event Rating
| median | worst |
|---|---|
List of all ratings can be found at SCN 2018/rating
| SCN 2018 | |
|---|---|
11th Conference on Security and Cryptography for Networks
| |
| Event in series | SCN |
| Dates | 2018-09-05 (iCal) - 2018-09-07 |
| Homepage: | http://scn.di.unisa.it/ |
| Location | |
| Location: | IT/72/Amalfi, IT/72, IT |
| Papers: | Submitted 66 / Accepted 30 (45.5 %) |
| Committees | |
| General chairs: | Roberto De Prisco |
| PC chairs: | Dario Catalano |
| PC members: | Elena Andreeva, Manuel Barbosa, Carlo Blundo, Jean-Sebastien Coron, Mario Di Raimondo, Léo Ducas |
| Keynote speaker: | Huijia (Rachel) Lin, Eike Kiltz |
| Table of Contents | |
Topics
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:
* Anonymity and Privacy * Applied Cryptography and Implementations * Authentication, Identification and Access Control * Block and Stream Ciphers * Complexity-Theoretic Cryptography * Cloud Computing Security * Cryptanalysis * Cryptocurrencies * Cryptographic Hash Functions * Cryptographic and Security Protocols * Digital Signatures and Message Authentication Codes * Distributed Systems Security * Formal Security Methods * Information-Theoretic Security * Network, Web and Wireless Security * Public-Key Encryption * Physical Cryptography * Security Architectures and Models * Software and Systems Security