Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS-2018)
With most services and products now being offered through digital communications, new challenges have emerged for cryptology specialists. A Multidisciplinary Perspectives in Cryptology presents a range of topics on the Cryptology methods and safety of information and communication technology. It brings together methods in applied mathematics, computer science, and engineering, telecommunication sciences, physics, chemistry, Digital Signal processing, Error Correcting Codes, information theory, electrical engineering, hardware realization aspects. The session aims to collect the papers oriented towards the introduction on multidisciplinary aspects and their importance in implementation of the new methods and algorithms designed for cryptography, cryptanalysis, and complexity evaluation of the designed algorithms. It improves the ability to process and manage information and knowledge-related processes in order to create new knowledge.
The workshop will aim to provide:
- Comprehensive coverage along with the latest developments in cryptography
- Presentation of many widely used cryptographic algorithms, cryptanalysis algorithms, and complexity evaluation methods that based mainly on multidisciplinary applications within these branches of Cryptology
The committee invites original and unpublished work from individuals active in the broad theme of the Workshop. The manuscripts should be submitted in PDF format. Authors should submit their papers online via EDAS. Unregistered authors should first create an account on EDAS to log on.
Recommended topics include, but are not limited to, the following:
- Code Based Cryptography
- Fuzzy Logic Based Cryptology
- Genetic Algorithm Based Cryptology
- Neural Based Cryptology
- Biometric Cryptography
- Chaos Based Cryptology
- Engineering and Cryptology
- ICA and PCA based Cryptology
- DSP based Cryptology
- Multidisciplinary in Wireless Communication Security
- Multidisciplinary in Information Hiding
- Multidisciplinary in Digital Watermarking
- Cryptography and Machine Learning
- Quantum Cryptography
- IoT and Embedded Cryptography
- Formal Methods for Cryptographic Protocol Analysis
- Cryptography for other Emerging Technologies and Applications
Submission Instructions
Authors should submit their papers online. We use EDAS system for managing submissions and review process. Unregistered authors should first create an account on EDAS to log on. Detailed usage instruction on EDAS can be found here.
Submissions must be in Portable Document Format (.pdf). The list of authors should not be included in the paper manuscript PDF, in accordance to the double blind submission policy. Changes to the paper metadata on EDAS are permitted before the paper submission deadline.
All submissions should be written in English with a maximum paper length of FIFTEEN (15 pages). However extra page charges will be applicable for papers exceeding 12 pages. Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers.
SSCC'18 accepts regular and work-in-progress papers. Regular papers should present novel perspectives within the general scope of the conference. Short papers (Work-in-Progress) are an opportunity to present preliminary or interim results.
Manuscript Template - Word Latex
Further formatting instructions are posted at http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0
Double Blind Submissions
All submitted papers will be judged based on their originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability through double-blind reviewing, where the identities of the authors are withheld from the reviewers. As an author, you are required to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Common sense and careful writing will go a long way towards preserving anonymity. Papers that do not conform with our double-blind submission policies will be rejected without review.
Minimally, please take the following steps when preparing your submission:
- Remove the names and affiliations of authors from the title page.
- Remove acknowledgments of identifying names and funding sources.
- Remove project titles or names that can be used to trace back to the authors via a web search engine.
- Use care in referring to related work, particularly your own. Do not omit references to provide anonymity, as this leaves the reviewer unable to grasp the context. Instead, reference your past work in the third person, just as you would any other piece of related work by another author. For example, instead of "In prior work [3], we presented a routing protocol that ...," sentences in the spirit of "In prior work, Smith and Clark [3] presented a routing protocol that ..." should be used. With this method, the full citation to Smith and Clark can still be given, such as "[3] J. Smith, A. Clark, "Analysis of...", and it is not acceptable to say "[3] Reference deleted for double-blind review."
- Papers with the same title and abstract should not be posted on a public website, such as arxiv.org, or transmitted via public mailing lists.
The organizers regard plagiarism as a serious professional misconduct. All submissions will be screened for plagiarism and when identified, the submissions by the same author will be rejected.
Submitted papers will undergo a peer review process, coordinated by the Program Committee. Each manuscript will be reviewed by a minimum of three reviewers. Acceptance of papers will be communicated to authors by email. The accepted regular and work-in-progress papers will be published in the conference proceedings. All accepted papers will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. The proceedings will be available via the SpringerLink digital library.
To be published in the SSCC'18 Conference Proceedings, an author of an accepted paper is required to register for the conference at the full rate. Both regular and work-in-progress papers will be scheduled for oral presentation. All accepted papers MUST be presented at the conference by one of the authors, or, if none of the authors are able to attend, by a qualified surrogate.
Technical Program Committee
Ahmed Abu Jbara, George Mason University, USA
Alka Sawlikar, Nagpur University, India
Anantkumar Umbarkar, Walchand College of Engineering, Sangli, MS, India
Arnab Biswas, Indian Institute of Science, India
Aws Yonis, Universitiy of Ninevah, Iraq
Babu Mehtre, IDRBT - Institute for Development and Research in Banking Technology, India
Bernardi Pranggono, Sheffield Hallam University, United Kingdom (Great Britain)
Chandra Sekaran, National Instittute of Technology Karnataka, India
Chandra Vorugunti, Indian Institute of Information Technology- SriCity, India
Deveshkumar Jinwala, S V National Institute of Technology, India
Ezendu Ariwa, University of Bedfordshire, United Kingdom (Great Britain)
Joshua Nehinbe, University of Essex, United Kingdom (Great Britain)
Kamatchi R, Amity University, Mumbai, India
Marco Rocchetto, United Technology Research Center, Italy
Neelam Surti, Gujarat Technological University, India
Rodrigo Campos Bortoletto, Sao Paulo Federal Institute of Education, Science and Technology, Brazil
S. Vijaykumar, 6TH SENSE, India
Sasirekha N, Bharathiar University, India
Siva Rama Krishna Tummalapalli, JNTUK-University College of Engineering Vizianagaram, India
Vladislav Skorpil, Brno University of Technology, Czech Republic
Yamuna Devi, VTU, Belagavi, India
Key Dates
Full Paper Submission Ends | July 31, 2018(Firm) |
Acceptance Notification | August 15, 2018 |
Final paper Deadline | August 25, 2018 |