IMPACT SCORE JOURNAL RANKING CONFERENCE RANKING Conferences Journals Workshops Seminars SYMPOSIUMS MEETINGS BLOG LaTeX 5G Tutorial Free Tools
CANS 2023 : Cryptology and Network Security
CANS 2023 : Cryptology and Network Security

CANS 2023 : Cryptology and Network Security

Augusta, Georgia, USA
Event Date: October 31, 2023 - November 02, 2023
Submission Deadline: July 13, 2023
Notification of Acceptance: August 10, 2023
Camera Ready Version Due: August 30, 2023




Call for Papers

************************************************************************

CANS 2023 -- Call For Papers

October 31st -- November 2nd, 2023

https://www.augusta.edu/ccs/conferences/cans2023/index.php

*** Final Extended Submission Deadline: July 13, 2023 ***

The 22nd International Conference on Cryptology and Network Security
(CANS) spans current advances in all aspects of cryptology, data
protection, and network and computer security. The session proceedings
and recommendations will be published in the Lecture Notes in Computer
Science series by Springer.

CANS 2023 will take place from October 31st to November 2nd , 2023,
in Augusta, Georgia, USA.

************************************************************************

SUBMISSION GUIDELINES

High quality papers on unpublished research and implementation
experiences may be submitted. All papers must be original and not
substantially duplicated work that has been published at, or is
simultaneously submitted to, a journal or another conference or
workshop. All submissions must be written in English and span no more
than 20 pages in the Springer’s Lecture Notes in Computer Science
(LNCS) format (a Springer template can be found in Overleaf),
including title, abstract, and bibliography. The introduction should
summarize the contributions of the paper at the level understandable
by a non-expert reader and explain the context to related work.

Submitted papers may contain supplementary material in the form of
well-marked appendices of any length. However, the main paper should
be intelligible without requiring the reader to consult supplementary
material. Submissions must be anonymous (no author names,
affiliations, acknowledgments, or obvious references). The conference
will also consider short papers of up to eight pages in the LNCS
format, excluding the bibliography, for results that are not yet fully
fleshed out or that simply require few pages to describe but still
make a significant contribution.

All submissions must be processed with LaTeX2e according to the
instructions given by Springer. Submitted manuscripts must be typeset
in plain Springer LNCS format, in particular without changing the font
size, margins or line spacing. Submissions not meeting these
guidelines may be rejected without consideration of their
merits. Papers must be submitted electronically in PDF format via
EasyChair:

https://easychair.org/my/conference?conf=cans2023

PRESENTATION AND PUBLICATION

At least one author of every accepted paper must register and pay the
full registration fee (non-student) for the conference by the early
registration deadline indicated by the organizers. Papers without a
registered author will be removed from the sessions. Authors must
present their own paper(s). Session proceedings, including all
accepted papers, will be published in LNCS and will be available at
the conference.

DATES

Submission Deadline: July 13, 2023 AoE (extended, final)
Paper Notification: August 10, 2023
Camera-Ready Deadline: August 30, 2023
CANS'23 will take place October 31 – November 2nd, 2023

TOPICS

- Access Control
- Anonymity & Pseudonymity
- Applied Cryptography
- Attacks & Malicious Code
- Authentication & Identification
- Biometrics
- Block & Stream Ciphers
- Blockchain Security and Privacy
- Cryptographic Algorithms and Primitives
- Cryptographic Protocols
- Cyber Physical Security
- Data and Application Security
- Denial of Service Protection
- Data Protection
- Data and Computation Integrity
- Embedded System Security
- Formal Methods for Security
- Hash Functions
- Identity Management
- Key Management
- Language-Based Security
- Malware Analysis and Detection
- Network Security
- Peer-to-Peer
- Privacy-Enhancing Technologies
- Public Key Cryptography
- Security & Privacy
- Security and Privacy for Big Data
- Security and Privacy in the Cloud
- Security in Content Delivery
- Secure Computation
- Secure Distributed Computing
- Security in Pervasive Systems
- Security in Social Networks
- Sensor Network Security
- Security in Crowdsourcing
- Security Architectures
- Security in Grid Computing
- Security Metrics
- Security in the Internet of Things
- Security Models
- Security in Location Services
- Security Policies
- Trust Management
- Usable Security
- Virtual Private Networks
- Wireless and Mobile Security
- Zero-Knowledge Proofs

COMMITTEES

General Chair

- Alex Schwarzmann, Augusta University, USA

Program Committee Co-Chairs

- Vlad Kolesnikov, Georgia Tech, USA
- Jing Deng, University of North Carolina at Greensboro, USA

Program Committee

- Cristina Alcaraz, University of Malaga, Spain
- Subhadeep Banik, University of Lugano, Switzerland, Switzerland
- Carlo Blundo, Università degli Studi di Salerno, Italy
- Bo Chen, Michigan Technological University, USA
- Arka Rai Choudhuri, Johns Hopkins University, USA
- Sherman S. M. Chow, The Chinese University of Hong Kong, China
- Bei-Tseng Chu, UNC Charlotte, USA
- Michele Ciampi, The University of Edinburgh, United Kingdom
- Bernardo David, IT University of Copenhagen, USA
- Jing Deng, UNCG, USA
- Shlomi Dolev, Ben-Gurion University of the Negev, Israel
- Pooya Farshim, University of York, United Kingdom
- Satrajit Ghosh, IIT Kharagpur, India
- Yong Guan, Iowa State University, USA
- Zhou Haifeng, Zhejiang University, China
- David Heath, UIUC, USA
- Ashwin Jha, CISPA Helmholtz Center for Information Security, Germany
- Elif Bilge Kavun, University of Passau, Germany
- Vladimir Kolesnikov, Georgia Institute of Technology, USA
- Ranjit Kumaresan, University of Maryland, College Park, MD, USA, USA
- Shangqi Lai, Monash University, Australia
- Riccardo Lazzeretti, University of Roma, Italy
- David Mohaisen, University of Central Florida, USA
- Sergio Pastrana, Universidad Carlos III de Madrid, Spain
- Sikhar Patranabis, IBM Research India, India
- Constantinos Patsakis, University of Piraeus, Greece
- Giuseppe Persiano, Università degli Studi di Salerno, Italy
- Josef Pieprzyk, CSIRO/Data61, Australia
- Lawrence Roy, Oregon State University, USA
- Somitra Sanadhya, IIT Jodhpur, India
- Dominique Schroeder, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
- Alberto Sonnino, Mysten Labs, USA
- Angelo Spognardi, Sapienza Università di Roma, Italy
- Christoph Striecks, AIT Austria, Austria
- Ajith Suresh, Technology Innovation Institute, Abu Dhabi, United Arab Emirates
- Willy Susilo, University of Wollongong, Australia
- Ni Trieu, UC Berkeley, USA
- Giorgos Vasiliadis, Hellenic Mediterranean University and FORTH-ICS, Greece
- Daniele Venturi, Sapienza University of Rome, Italy
- Ivan Visconti, DIEM, University of Salerno, Italy
- Isabel Wagner, University of Basel, Switzerland
- Edgar Weippl, University of Vienna, Austria
- Yibin Yang, Georgia Institute of Technology, USA

Organizing Committee

- Caroline Eaker, Local Arrangements, Augusta University, USA
- Sen He, Augusta University, USA
- Luca Mariot, Publicity Chair, University of Twente, the Netherlands
- Jeff Morris, Augusta University, USA
- Michael Nowatkowski, Augusta University, USA
- Reza Rahaeimehr, Web Master, Augusta University, USA
- Alex Schwarzmann, Chair, Augusta University, USA
- Joanne Sexton, Augusta University, USA
- Edward Tremel, Registration, Augusta University, USA
- Zi Wang, Augusta University, USA
- Steve Weldon, Local Arrangements, Augusta University, USA
- Regina White, Business Manager, Augusta University, USA
- Shungeng Zhang, Augusta University, USA

WEBSITE

https://www.augusta.edu/ccs/conferences/cans2023/index.php


Credits and Sources

[1] CANS 2023 : Cryptology and Network Security


Check other Conferences, Workshops, Seminars, and Events


OTHER CRYPTOGRAPHY EVENTS

CSP 2026: 2026 10th International Conference on Cryptography, Security and Privacy (CSP 2026)
Sapporo, Japan
Apr 25, 2026
CCSW 2025: The ACM Cloud Computing Security Workshop
Taipei, Taiwan
Oct 17, 2025
ACM QRSEC 2025: ACM CCS Workshop on Quantum-Resistant Cryptography and Security (ACM QRSEC 2025)
Taipei, Taiwan
Oct 13, 2025
CheckMATE 2025: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks @ ACM CCS 2025
Taipei, Taiwan
Oct 17, 2025
BLKCA 2025: 3rd International Conference on Blockchain and Applications
Virtual Conference
Aug 9, 2025
SHOW ALL

OTHER SECURITY EVENTS

SPTM 2025: 13th International Conference of Security, Privacy and Trust Management
London, United Kingdom
Jul 26, 2025
ICMIP--EI 2026: 2026 11th International Conference on Multimedia and Image Processing (ICMIP 2026)
Sapporo, Japan
Apr 25, 2026
CSP--EI 2026: 2026 10th International Conference on Cryptography, Security and Privacy (CSP 2026)
Sapporo, Japan
Apr 25, 2026
ICSIE--EI 2026: 2026 14th International Conference on Software and Information Engineering (ICSIE 2026)
Himeji, Japan
Jan 16, 2026
ICNT--EI 2026: 2026 8th International Conference on Network Technology (ICNT 2026)
Himeji, Japan
Jan 16, 2026
SHOW ALL

OTHER PRIVACY EVENTS

SPTM 2025: 13th International Conference of Security, Privacy and Trust Management
London, United Kingdom
Jul 26, 2025
DPM 2025: 20th International Workshop on Data Privacy Management (DPM 2025)
Toulouse, France
Sep 25, 2025
ICAISG--EI 2025: 2025 International Conference on Artificial Intelligence Security and Governance (ICAISG 2025)
Hangzhou, China
Dec 12, 2025
WIPE-OUT 2025: Workshop on Innovations, Privacy-preservation, and Evaluations Of machine Unlearning Techniques
Porto, Portugal
Sep 15, 2025
FPS 2025: Foundations and Practice of Security
Brest
Nov 25, 2025
SHOW ALL