Call for Papers
Original research papers on all technical aspects of cryptology and network security are solicited for submission to CANS 2012. Papers suggesting novel paradigms, original directions, or non-traditional perspectives are especially welcome.

Call for Papers PDF format

Call for Papers Plain format

Important Dates
  • Submission deadline: 15th of July, 2012 (extended!)
  • Notification of acceptance: 8th of September, 2012
  • Camera-ready version due: 6th of October, 2012
  • Conference: December 12-14, 2012
As in previous years it is planned to publish the proceedings by Springer in Lecture Notes in Computer Science (LNCS).

General, Program, and Local Arrangements Committees

Topics of Interest
  • Access Control
  • Anonymity and Pseudonymity and Untraceability
  • Authentication and Identification
  • Biometrics
  • Block and Stream Ciphers
  • Cloud Security
  • Cryptographic Algorithms, Protocols and Schemes
  • Denial of Service: Attacks and Countermeasures
  • Hash Functions
  • (Future) Internet Security
  • Key Management
  • Peer-to-Peer Security
  • Identity and Trust Management
  • Public-key Cryptography
  • Secure Hardware
  • Security Modeling and Architectures
  • Spyware Analysis and Detection
  • Wireless, Mobile, Embedded Platform and Network Security
Instructions for Authors
The submission should be at most 12 pages excluding the bibliography and appendices, and at most 20 pages in total, using reasonable margins and font size. The submitted paper should be intelligible and self-contained without appendices, as committee members are not required to read them. Authors are encouraged to prepare their submission following Springer's guideline.

Submissions must be fully anonymous, with no author names, affiliations, acknowledgments, or obvious references. The submission should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Submissions ignoring these guidelines risk rejection without consideration of their merits. If accepted, one of the authors is expected to present the paper at the conference.

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with formally published proceedings. Accepted submissions may not appear in any other conference or workshop with proceedings. Submissions violating these rules will be rejected and may entail further consequences. Program Co-Chairs reserve the right to share information about submissions with other Program Committees.

Program committee members are allowed to submit one paper, and a second one if co-authored by a student. Any PC member submission will be held to higher standards than other submissions.