Workshop on Multidisciplinary Perspectives in Cryptology and Information Security (CIS-2019)
Papers Due | October 20, 2019 |
Acceptance Notification | October 31, 2019 |
Final paper Deadline | November 25, 2019 |
With most services and products now being offered through digital communications, new challenges have emerged for cryptology specialists. A Multidisciplinary Perspectives in Cryptology presents a range of topics on the Cryptology methods and safety of information and communication technology. It brings together methods in applied mathematics, computer science, and engineering, telecommunication sciences, physics, chemistry, Digital Signal processing, Error Correcting Codes, information theory, electrical engineering, hardware realization aspects. The session aims to collect the papers oriented towards the introduction on multidisciplinary aspects and their importance in implementation of the new methods and algorithms designed for cryptography, cryptanalysis, and complexity evaluation of the designed algorithms. It improves the ability to process and manage information and knowledge-related processes in order to create new knowledge.
The workshop will aim to provide:
- Comprehensive coverage along with the latest developments in cryptography
- Presentation of many widely used cryptographic algorithms, cryptanalysis algorithms, and complexity evaluation methods that based mainly on multidisciplinary applications within these branches of Cryptology
The committee invites original and unpublished work from individuals active in the broad theme of the Workshop. The manuscripts should be submitted in PDF format. Authors should submit their papers online via EDAS. Unregistered authors should first create an account on EDAS to log on.
Recommended topics include, but are not limited to, the following:
- Code Based Cryptography
- Fuzzy Logic Based Cryptology
- Genetic Algorithm Based Cryptology
- Neural Based Cryptology
- Biometric Cryptography
- Chaos Based Cryptology
- Engineering and Cryptology
- ICA and PCA based Cryptology
- DSP based Cryptology
- Multidisciplinary in Wireless Communication Security
- Multidisciplinary in Information Hiding
- Multidisciplinary in Digital Watermarking
- Quantum Cryptography
- Identity and Access Management
- Risk Management
- Vulnerability Assessment and Management
- Cyber Operational Planning
- IoT and Embedded Cryptography
- Software Security
- Applications of Machine Learning and Deep Learning in Cryptography
- Location Based Encryption Techniques
- Formal Methods for Cryptographic Protocol Analysis
- Cryptography for other Emerging Technologies and Applications
Submission Instructions
Authors should submit their papers online. We use EDAS system for managing submissions and review process. Unregistered authors should first create an account on EDAS to log on. Detailed usage instruction on EDAS can be found here.
Submissions must be in Portable Document Format (.pdf). The list of authors should not be included in the paper manuscript PDF, in accordance to the double blind submission policy. Changes to the paper metadata on EDAS are permitted before the paper submission deadline.
All submissions should be written in English with a maximum paper length of FIFTEEN (15 pages). However extra page charges will be applicable for papers exceeding 12 pages. Authors should pay special attention to unusual fonts, images, and figures that might create problems for reviewers.
SSCC'19 accepts regular and work-in-progress papers. Regular papers should present novel perspectives within the general scope of the conference. Short papers (Work-in-Progress) are an opportunity to present preliminary or interim results.
Manuscript Template - Word Latex
Further formatting instructions are posted at http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0
Double Blind Submissions
All submitted papers will be judged based on their originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability through double-blind reviewing, where the identities of the authors are withheld from the reviewers. As an author, you are required to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Common sense and careful writing will go a long way towards preserving anonymity. Papers that do not conform with our double-blind submission policies will be rejected without review.
Minimally, please take the following steps when preparing your submission:
- Remove the names and affiliations of authors from the title page.
- Remove acknowledgments of identifying names and funding sources.
- Remove project titles or names that can be used to trace back to the authors via a web search engine.
- Use care in referring to related work, particularly your own. Do not omit references to provide anonymity, as this leaves the reviewer unable to grasp the context. Instead, reference your past work in the third person, just as you would any other piece of related work by another author. For example, instead of "In prior work [3], we presented a routing protocol that ...," sentences in the spirit of "In prior work, Smith and Clark [3] presented a routing protocol that ..." should be used. With this method, the full citation to Smith and Clark can still be given, such as "[3] J. Smith, A. Clark, "Analysis of...", and it is not acceptable to say "[3] Reference deleted for double-blind review."
- Papers with the same title and abstract should not be posted on a public website, such as arxiv.org, or transmitted via public mailing lists.
The organizers regard plagiarism as a serious professional misconduct. All submissions will be screened for plagiarism and when identified, the submissions by the same author will be rejected.
Submitted papers will undergo a peer review process, coordinated by the Program Committee. Each manuscript will be reviewed by a minimum of three reviewers. Acceptance of papers will be communicated to authors by email. The accepted regular and work-in-progress papers will be published in the conference proceedings. All accepted papers will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. The proceedings will be available via the SpringerLink digital library.
To be published in the SSCC'19 Conference Proceedings, an author of an accepted paper is required to register for the conference at the full rate. Both regular and work-in-progress papers will be scheduled for oral presentation.
Technical Program Committee
Farid Nait-Abdesselam, University of Missouri Kansas City, USA
Bob Natale, The MITRE Corporation, USA
Zhiyuan Zheng, Texas A&M University, USA
Thomas Chen, City University London, United Kingdom
Ting Chen, University of Electronic Science and Technology of China (UESTC), P.R. China
Meng Li, Beijing Institute of Technology, P.R. China
Xiangxue Li, East China Normal University, P.R. China
Yangyang Li, China Academy of Electronics and Information Technology, P.R. China
Ximeng Liu, Fuzhou University, P.R. China
Renyong Wu, Hunan University, P.R. China
Mingfu Xue, Nanjing University of Aeronautics and Astronautics, P.R. China
Yong Yu, Shaanxi Normal University, P.R. China
Yuan Zhang, University of Electronic Science and Technology of China, P.R. China
Ayoub Bahnasse, University Hassan II Casablanca, Morocco
Francesco Palmieri, Università di Salerno, Italy
Marco Rocchetto, United Technologies Research Center, Italy
Nidhal Abass, University of Kufa, Iraq
Aws Yonis, Universitiy of Ninevah, Iraq
Arnab Biswas, Universite Bretagne Sud, India
Geethakumari G, BITS-Pilani, Hyderabad Campus, India
Anantkumar Umbarkar, Walchand College of Engineering, Sangli, MS, India
Syed Zafaruddin, BITS Pilani, India
Vladislav Skorpil, Brno University of Technology, Czech Republic
Rodrigo Bortoletto, Instituto Federal de São Paulo, Brazil
Zubair Baig, Deakin University, Australia
Xingliang Yuan, Monash University, Australia
Minh Le, Information Technology Institute - VNU, Vietnam