2nd EAI International Conference on Applied Cryptography in Computer and Communications

EAI AC3 2022


Computer Networks & Wireless Communication



Scope
The AC3 conference intends to bring together researchers and practitioners from all areas of applied cryptography in computer and communication systems. The conference encourages submissions on all technical aspects of applied cryptography, including but not limited to cryptographic algorithms, protocols, implementations, standards and practices, and applications of cryptography in computer, information, and system security. We encourage submissions on the utilization of cryptographic technologies to solve security problems in real-world systems, including cloud services, the Internet of Things, cyber-physical systems, distributed systems, edge computing, information-centric networks, databases, data centers, etc.
***
Publication
All registered papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library.
Proceedings will be submitted for inclusion in leading indexing services, Ei Compendex, Web of Science, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL).
Authors of selected papers will be invited to submit an extended version to:
- Mobile Networks and Applications – Springer (SCI-E, IF=2.602)
- EAI Endorsed Transactions on Scalable Information Systems (Open Access) – indexed in ESCI & Ei Compendex
All accepted authors are eligible to submit an extended version in a fast track of:
- EAI Endorsed Transactions on Security and Safety (Open Access)
Additional publication opportunities:
- EAI/Springer Innovations in Communications and Computing Book Series
(titles in this series are indexed in Ei Compendex, Web of Science & Scopus)
***
Topics
Authenticated Encryption
Hash Functions and MACs
Provable Security
Public Key Encryption
Digital Signatures
Key Exchange/Agreement
Searchable Encryption
Key Management
Cryptographic Protocols
Multiparty Secure Computation
Financial Cryptography
Cryptographic Implementations
Post-Quantum Cryptography
Side Channel Attacks and Prevention
Anonymity and Privacy-Enhancing
Authentication and Identity Management
Data Protection
Database Security
Digital Rights Management
Trust Management
Trusted Hardware and Cryptographic Hardware
Applied Cryptography in Blockchain
Applied Cryptography in IoT/CPS
Applied Cryptography in Clouds
Applied Cryptography in Mobile Systems
Applied Cryptography in VANET
Applied Cryptography in Information-Centric Networks
Applied Cryptography in Edge Computing
Applied cryptography in Big Data and Artificial Intelligence
***
Honorary Chair
Yongbiao Liu - Jinling Institute of Technology, China
General Chairs
Bo Luo - The University of Kansas, USA
Zheng Zhang - Jinling Institute of Technology, China
Technical Program Committee Chairs
Jingqiang Lin - University of Science and Technology of China, China
Qiang Tang - The University of Sydney, Australia
***
This event is organized by EAI (www.eai.eu).
EAI – European Alliance for Innovation is a non-profit organization and a professional community established in cooperation with the European Commission to empower global research and innovation, and to promote cooperation between European and International ICT communities.