Difference between revisions of "SCN 2020"
Jump to navigation
Jump to search
(modified through wikirestore by orapi) |
(modified through wikirestore by orapi) |
||
Line 18: | Line 18: | ||
|Homepage=https://scn.unisa.it/ | |Homepage=https://scn.unisa.it/ | ||
|Start date=2020-09-14 | |Start date=2020-09-14 | ||
− | |Title =The Twelfth Conference on Security and Cryptography for Networks}} | + | |Title =The Twelfth Conference on Security and Cryptography for Networks |
+ | }} | ||
== Topics == | == Topics == | ||
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to: | All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to: |
Latest revision as of 04:26, 6 December 2021
Event Rating
median | worst |
---|---|
![]() |
![]() |
List of all ratings can be found at SCN 2020/rating
SCN 2020 | |
---|---|
The Twelfth Conference on Security and Cryptography for Networks
| |
Event in series | SCN |
Dates | 2020-09-14 (iCal) - 2020-09-16 |
Homepage: | https://scn.unisa.it/ |
Location | |
Location: | IT/72/Amalfi, IT/72, IT |
Important dates | |
Papers: | 2020/04/19 |
Submissions: | 2020/04/19 |
Notification: | 2020/06/14 |
Camera ready due: | 2020/06/28 |
Committees | |
Organizers: | International Association for Cryptologic Research |
General chairs: | Clemente Galdi |
PC chairs: | Vladimir Kolesnikov |
PC members: | Divesh Aggarwal, Elena Andreeva, Gilad Asharov, Saikrishna Badrinarayanan, Manuel Barbosa |
Table of Contents | |
Topics
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:
- Anonymity and Privacy
- Applied Cryptography and Implementations
- Authentication, Identification and Access Control
- Block and Stream Ciphers
- Complexity-Theoretic Cryptography
- Cloud Computing Security
- Cryptanalysis
- Cryptocurrencies
- Cryptographic Hash Functions
- Cryptographic and Security Protocols
- Digital Signatures and Message Authentication Codes
- Distributed Systems Security
- Formal Security Methods
- Information-Theoretic Security
- Network, Web and Wireless Security
- Public-Key Encryption
- Physical Cryptography
- Security Architectures and Models
- Software and Systems Security