===================================================================== SCN 2016 Tenth Conference on Security and Cryptography for Networks August 31 - September 2, 2016, Amalfi, Italy http://scn.dia.unisa.it/ ===================================================================== Scope The Tenth Conference on Security and Cryptography for Networks (SCN 2016) aims to bring together researchers in the field of cryptography and information security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of cryptography and information security. The primary focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings. Topics All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to: Anonymity and Privacy Applied Cryptography and Implementations Authentication, Identification and Access Control Block and Stream Ciphers Complexity-Theoretic Cryptography Cloud Computing Security Cryptanalysis Cryptocurrencies Cryptographic Hash Functions Cryptographic and Security Protocols Digital Signatures and Message Authentication Codes Distributed Systems Security Formal Security Methods Information-Theoretic Security Network, Web and Wireless Security Public-Key Encryption Physical Cryptography Security Architectures and Models Software and Systems Security Submissions Authors are invited to submit electronically (PDF format) a non-anonymous extended abstract. The extended abstract should be typeset using 11-point or larger fonts, in a single-column, single-space (between lines) format and have reasonable margins. Submissions deviating significantly from these guidelines risk rejection without consideration of their merits. All submissions will be treated as confidential, and will only be disclosed to the committee and their chosen sub-referees. The submission should begin with a title, followed by the names, affiliations and contact information of all authors, and a short abstract. The length of the submission should be at most 14 pages excluding the title page, bibliography, and appendices. Within these 14 pages the submission should clearly indicate the results achieved, their significance, and their relation to other work in the area. Referees are not required to read appendices; the paper should be intelligible without them. Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to a journal or to any other conference or workshop with proceedings. Best Paper Award All submissions are eligible for the Best Paper award. The committee may decide to split the award between multiple papers, or to decline to make an award. Presentation Authors of accepted papers must guarantee that their paper will be presented at the conference. Proceedings The proceedings will be published by Springer in the Lecture Notes in Computer Science series. IACR This event is organized in cooperation with the International Association for Cryptologic Research. Dates and Deadlines Submission: April 27, 2016, 21:00 UTC Notification to authors: June 19, 2016 Camera-Ready Version: June 27, 2016 Conference: August 31 - September 2, 2016 Program Chair Vassilis Zikas, ETH Zurich & RPI, Switzerland & USA Program Committee Divesh Aggarwal, EPFL, Switzerland Shweta Agrawal, Indian Institute of Technology, India Joël Alwen, IST, Austria Gilad Asharov, The Hebrew University of Jerusalem, Israel Foteini Baldimtsi, Boston University & University of Athens, USA & Greece Jeremiah Blocki, Microsoft Research, New England, USA David Cash, Rutgers University, USA Nishanth Chandran, Microsoft Research, India Karim El Defrawy, HRL Labs, USA Sebastian Faust, Ruhr-Universität Bochum, Germany Juan Garay, Yahoo Labs, USA Sanjam Garg, UC Berkeley, USA Shafi Goldwasser, MIT, USA Stanislaw Jarecki, UC Irvine, USA Iordanis Kerenidis, University Paris Diderot 7, France Ranjit Kumaresan, MIT, USA Steve Lu, Stealth Software Technologies Inc., USA Ueli Maurer, ETH Zurich, Switzerland Charalampos Papamanthou, University of Maryland, USA Anat Paskin-Cherniavsky, Ariel University, Israel Rafael Pass, Cornell University & Cornell NYC Tech., USA Kenny Paterson, Royal Holloway, University of London, UK Christian Rechberger, DTU, Denmark Raphael Reischuk, ETH Zurich, Switzerland Alessandra Scafuro, Boston University & Northeastern University, USA Peter Schwabe, Radboud University, Netherlands Damien Stehlé, ENS de Lyon, France Marc Stevens, CWI, Netherlands Vanessa Teague, University of Melbourne, Australia Stefano Tessaro, UC Santa Barbara, USA Hong-Sheng Zhou, Virginia Commonwealth University, USA Vassilis Zikas, ETH Zurich & RPI, Switzerland & USA General Chair Roberto De Prisco, Universita' di Salerno, Italy Local Organization Carlo Blundo, Universita' di Salerno, Italy Luigi Catuogno, Universita' di Salerno, Italy Aniello Castiglione, Universita' di Salerno, Italy Paolo D'Arco, Universita' di Salerno, Italy Steering Committee Carlo Blundo, Universita' di Salerno, Italy Alfredo De Santis, Universita' di Salerno, Italy Ueli Maurer, ETH Zurich, Switzerland Rafail Ostrovsky, University of California - Los Angeles, USA Giuseppe Persiano, Universita' di Salerno, Italy Jacques Stern, ENS Paris, France Douglas Stinson, University of Waterloo, Canada Gene Tsudik, University of California - Irvine, USA Moti Yung, Google, USA =====================================================================