4th International Conference on Applied Cryptography and Network Security (ACNS 2006) June 6-9, 2006 Singapore CALL FOR PAPERS http://acns2006.i2r.a-star.edu.sg/ Original papers on all technical aspects of cryptology and network secuirty are solicited for submission to ACNS'06, the 4th annual conference on Applied Cryptography and Network Security. There are two tracks for ACNS: an academic track and an industrial track. The latter has an emphasis on practical applications. The PC will consider moving submissions between tracks if the PC feels that a submission is more appropriate for that track (with author permission). Topics of relevance include but are not limited to: - Applied cryptography, cryptographic constructions - Cryptographic applications: payments, fair exchange, time-stamping, auction, voting, polling - Denial of service: attacks and countermeasures - Email security, spam prevention - Fundamental services on network and distributed systems: authentication, data integrity, confidentiality, authorization, non-repudiation, and availability - Implementation, deployment and management of network security policies - Integrating security in Internet protocols: routing, naming, TCP/IP, multicast, network management - Integrating security services with system and application security facilities and protocols: message handling, file transport/access, directories, time synchronization, database management, boot services, mobile computing - Intellectual property protection: protocols, implementations, metering, watermarking, digital rights management - Intrusion avoidance, detection, and response: systems, experiences and architectures - Network perimeter controls: firewalls, packet filters, application gateways - Public key infrastructure, key management, certification, and revocation - Securing critical infrastructure: routing protocols, and emergency communication - Security and privacy for emerging technologies: sensor networks, wireless/mobile (and ad hoc) networks, bluetooth, 802.11, and peer-to-peer systems - Security of limited devices: light-weight cryptography, efficient protocols and implementations - Security modeling and protocol design in the context of rational and malicious adversaries - Usable security and deployment incentives for security technology - Virtual private networks - Web security and supporting systems security, such as databases, operating systems, etc. Important Dates - Submission Deadline: 15 January 2006 - Author Notification: 12 March 2006 - Camera-ready Copy: 1 April 2006 - Conference: June 6-9, 2006 General Chair Feng Bao (Institute for Infocomm Research, Singapore) Program Chairs: Jianying Zhou (Institute for Infocomm Research, Singapore) Moti Yung (Columbia University, USA) Program Committee TBD Publicity Chair Yongfei Han (ONETS, China) Author Instructions Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. There will be two tracks: an academic track, and a technical/industrial track. Submissions to the academic track should emphasize research advances, while submissions to the technical/industrial track may focus on implementations of known schemes and deployment observations. Authors of accepted papers must guarantee that their paper will be presented at the conference. Submission Format The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of keywords, in Portable Document Format (.pdf) with all fonts embedded, at most 15 pages excluding bibliography and appendices. Committee members are not required to read appendices; the paper should be intelligible without them. It is strongly preferred that submissions be processed in LaTeX according to the instructions listed on http://www.springer.de/comp/lncs/authors.html, since this will be a mandatory requirement for the final version of papers. Authors are requested to mark their submissions as "academic track" or "technical/industrial track". Submissions to the academic track may be considered for the technical/industrial track. Also, authors are requested to indicate whether submissions are to be considered for the best student paper; only papers co-authored and presented by a full-time student are eligible for this award. Conference Proceedings Proceedings for the academic track will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Clear instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers. Proceedings for the technical/industrial track will be published in a separate volume, not the LCNS. Contact Please direct questions regarding the conference to organizers at acns06(at)i2r.a-star.edu.sg