国際会議 CANS 2009 の投稿締切が6/11まで延長されました.
ネットワークセキュリティから暗号理論まで,
幅広いトピックでの論文投稿をお待ち申し上げております.

投稿締切:2009年 6月11日(採録論文はLNCSとして出版)
会議日程:2009年12月12-14日
開催場所:石川県立美術館

複数受け取られた方にはご容赦いただければ幸いです.



[Apologies if you receive multiple copies]

--- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * ---

                         - Call for Papers -

                 The 8th International Conference on
              CRYPTOLOGY AND NETWORK SECURITY (CANS 2009)

                        12 - 14 December 2009
                      Kanazawa, Ishikawa, Japan
             Web Page: http://www.rcis.aist.go.jp/cans2009/
                 Contact: cans2009-info@m.aist.go.jp

[Overview]
 The main goal of this conference is to promote research on all
 aspects of network security, as well as to build a bridge between
 research on cryptography and on network security. We therefore
 welcome scientific and academic papers with this focus. Previous
 CANS have been held in Taipei (2001), San Francisco (2002), Miami
 (2003), Xiamen (2005), Suzhou (2006), Singapore (2007), and Hong
 Kong (2008).

[Topics]
 Areas of interest for CANS 2009 include, but are not limited to:
 - Ad Hoc and Sensor Network Security
 - Access Control for Networks
 - Anonymity and Pseudonymity
 - Authentication Services
 - Cryptographic Protocols and Schemes
 - Denial of Service Protection
 - Digital Rights Management
 - Fast Cryptographic Algorithms
 - Identity and Trust Management
 - Information Hiding and Watermarking
 - Internet and Router Security
 - Intrusion Detection and Prevention
 - Mobile and Wireless Network Security
 - Multicast Security
 - Phishing and Online Fraud Prevention
 - Peer-to-Peer Network Security
 - PKI
 - Security Modeling and Architectures
 - Secure Protocols (SSH, SSL, ...) and Applications
 - Spam Protection
 - Spyware Analysis and Detection
 - Virtual Private Networks

[Instructions for Authors]
 Papers on cryptology and network security are welcome. Papers that
 make a substantial link between these areas will be given priority.
 Authors of such papers are encouraged to elaborate on the relevant
 connection in a subsection of the introduction. High-quality
 papers on pure cryptology or pure network security may also be
 accepted.

 Submissions must not substantially duplicate work that any of the
 authors has published elsewhere or has submitted in parallel for
 consideration of any other conference or workshop with proceedings.
 Submissions should have at most 12 pages excluding the bibliography
 and appendices, and at most 20 pages in total, using at least
 11-point fonts and with reasonable margins. The total length of the
 final versions for Springer's LNCS will be at most 20 pages.
 Committee members are not required to read appendices; the paper
 should be intelligible without them. All submissions should be
 anonymous. Authors of accepted papers must guarantee that at least
 one of the authors will attend the conference and present their
 paper.

 Submitted papers should follow the formatting instructions of the
 Springer LNCS Style. Please check the Information for LNCS Authors
 page at Springer at http://www.springer.com/lncs for style and
 formatting guidelines. Submissions not meeting the submission
 guidelines risk rejection without consideration of their merits.

[Proceedings]
 The conference proceedings will be published in the Lecture Notes
 in Computer Science series by Springer Verlag
 (http://www.springer.com/lncs), and be available at the conference.

[Important Dates]
 Submission Deadline     : 11 June 2009 (23:59:59 JST)
 Acceptance Notification : 14 August 2009 (JST)
 Camera-ready Copy Due   : 4 September 2009
 Conference              : 12 - 14 December 2009

[Confirmed Invited Speakers]
 Adrian Perrig         CMU, US

[Best Paper Award]
 The Program Committee will consider giving a Best Paper Award to
 the submission with highest merits. (Details to be announced.)

[Stipend]
 A limited number of stipends are available to those unable to obtain
 funding to attend the conference, and to students whose papers are
 accepted and who will present the paper themselves. Requests for
 stipends should be addressed to the general chair by August 31st.

[Program Committee and Organizers]
Jointly Organized By:
 National Institute of Advanced Industrial Science and Technology
 (AIST), Japan
 Japan Advanced Institute of Science and Technology (JAIST), Japan

Supported By:
 Special Interest Group on Computer Security (CSEC), IPSJ, Japan
 Technical Group on Information Security (ISEC), IEICE, Japan
 Technical Committee on Information and Communication System
 Security (ICSS), IEICE, Japan
 Society of Information Theory and its Applications (SITA), Japan

Sponsored By:
 National Institute of Information and Communications Technology
 (NICT), Japan
 Institute of Regional Information Systems (IRIS), Japan
 ComWorth Co., LTD, Japan
 Hitachi, Ltd., Japan

CANS Steering Committee:
 Yvo Desmedt           University College London, UK
 Matt Franklin         UC Davis, USA
 Lucas Hui             The University of Hong Kong, China
 Yi Mu                 University of Wollongong, Australia
 David Pointcheval     CNRS and ENS, France
 Huaxiong Wang         NTU, Singapore

General Chair:
 Akira Otsuka          AIST, Japan

Program Co-Chairs:
 Juan A. Garay         AT&T Labs - Research, USA
 Atsuko Miyaji         JAIST, Japan

Program Committee:
 Jean-Luc Beuchat      Tsukuba Univ, Japan
 Alexandra Boldyreva   Georgia Tech, US
 Colin Boyd            Queensland Univ of Technology, Australia
 Emmanuel Bresson      DCSSI Crypto Lab, France
 Mike Burmester        FSU, US
 Koji Chida            NTT Labs, Japan
 Ee-Chien Chang        National University of Singapore, Singapore
 Rosario Gennaro       IBM Watson, US
 Trevor Jim            AT&T Labs - Research, US
 Charanjit Jutla       IBM Watson, US
 Seny Kamara           Microsoft Research, US
 Aggelos Kiayias       UConn, US
 Vladimir Kolesnikov   Bell Labs, US
 Tanja Lange           Technical University Eindhoven, Netherlands
 Dong Hoon Lee         Korea Univ, Korea
 Pil Joong Lee         Pohang University of Science and Technology, Korea
 Benoit Libert         UCL, Belgium
 Helger Lipmaa         Cybernetica AS, Estonia
 Subhamoy Maitra       Indian Statistical Institute, India
 Mark Manulis          TU Darmstadt, Germany
 David Nowak           AIST, Japan
 Wakaha Ogata          Tokyo Institute of Technology, Japan
 C. Pandu Rangan       IIT Madras, India
 Kenny Paterson        Royal Holloway, University of London, UK
 Rene Peralta          NIST, US
 Josef Pieprzyk        Macquarie University, Australia
 German Saez           UPC, Spain
 Taizo Shirai          Sony, Japan
 Adam Smith            Penn State Univ, US
 Jessica Staddon       PARC, US
 Douglas Stinson       University of Waterloo, Canada
 Willy Susilo          University of Wollongong, Australia
 Tsuyoshi Takagi       Future University - Hakodate, Japan
 Gene Tsudik           UC Irvine, US
 Ivan Visconti         University of Salerno, Italy
 Xiaoyun Wang          Shandong University, China
 Duncan S Wong         City University of Hong Kong, China
 Sung-Ming Yen         National Central University, Taiwan
 Hong-Sheng Zhou       UConn, US
 Jianying Zhou         I2R, Singapore

Organizing Committee:
 Tomoyuki Asano        Sony, Japan
 Isao Echizen          NII, Japan
 Shoichi Hirose        University of Fukui, Japan
 Atsuo Inomata         NAIST, Japan
 Daisuke Inoue         NICT, Japan
 Shinichiro Matsuo     NICT, Japan
 Tatsuyuki Matsushita  Toshiba, Japan
 Natsume Matsuzaki     Panasonic, Japan
 Kunihiko Miyazaki     Hitachi, Japan
 Takao Ogura           Fujitsu Laboratories, Japan
 Yutaka Oiwa           AIST, Japan
 Takeshi Okamoto       Tsukuba University of Technology, Japan
 Kazumasa Omote        JAIST, Japan
 Kensuke Shibata       NTT Labs, Japan
 Yuji Suga             IIJ, Japan
 Toshihiro Tabata      Okayama University, Japan
 Katsuyuki Takashima   Mitsubishi Electric, Japan
 Keisuke Takemori      KDDI R&D Labs., Japan
 Shoko Yonezawa        AIST, Japan

--- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --
-- 
I LOVE SNOOPY!  でつ
Yoshitaka Ikeda mailto:ikeda@4bn.ne.jp
My Honeypot: honey@4bn.ne.jp  <-don't send this address