Call for Papers: ICITS 2015
<br>===========================
<br>8th International Conference on Information-theoretic Security (ICITS)
<br>May 2-5, 2015, USI Lugano, Switzerland
<br>www.icits2015.net
<br>
<br>
<br>This is the eighth in a series of conferences that aims to bring together the leading researchers in the
<br>areas of information theory, quantum information theory, and cryptography. ICITS covers all aspects of
<br>information-theoretic security, from relevant mathematical tools to theoretical modeling to implementation.
<br>Papers on all technical aspects of these topics are solicited for submission. Areas of interest include,
<br>but are not restricted to:
<br>Physical layer security / Multiparty computation / Codes, lattices, & cryptography / Authentication codes /
<br>Randomness extraction / Cryptography from noisy channels / Wiretap channels / Bounded-storage models /
<br>Information-theoretic reductions / Quantum cryptography / Quantum information theory / Nonloca...
Read more
Call for Papers: ICITS 2015
<br>===========================
<br>8th International Conference on Information-theoretic Security (ICITS)
<br>May 2-5, 2015, USI Lugano, Switzerland
<br>www.icits2015.net
<br>
<br>
<br>This is the eighth in a series of conferences that aims to bring together the leading researchers in the
<br>areas of information theory, quantum information theory, and cryptography. ICITS covers all aspects of
<br>information-theoretic security, from relevant mathematical tools to theoretical modeling to implementation.
<br>Papers on all technical aspects of these topics are solicited for submission. Areas of interest include,
<br>but are not restricted to:
<br>Physical layer security / Multiparty computation / Codes, lattices, & cryptography / Authentication codes /
<br>Randomness extraction / Cryptography from noisy channels / Wiretap channels / Bounded-storage models /
<br>Information-theoretic reductions / Quantum cryptography / Quantum information theory / Nonlocality and
<br>nonsignaling / Key and message rates / Secret sharing / Physical models & assumptions / Network coding
<br>security / Adversarial channel models / Information-theoretic tools in computational settings /
<br>Implementation challenges / Biometric security
<br>
<br>
<br>
<br>
<br>
<br>Important Dates:
<br>- Conference Track Submission Deadline: November 21, 2014
<br>- Workshop Track Submission Deadline: December 5, 2014
<br>- Notification of Decision: January 30, 2015
<br>- Conference: May 2-5, 2015
<br>
<br>
<br>
<br>
<br>
<br>Two Tracks: Conference and Workshop:
<br>As the goal of ICITS is to bring together researchers on all aspects of information-theoretic security,
<br>it consists of two tracks with different types of contributed presentations:
<br>
<br>- Conference Track (with proceedings): Submissions to this track must be original papers that have not
<br>previously appeared in published form. Accepted papers will be presented at the conference and will
<br>appear in the conference proceedings, which will be published by Springer in the LNCS series.
<br>
<br>- Workshop Track (no proceedings): To encourage presentation of work from a variety of fields (especially
<br>those where conference publication is unusual or makes journal publication difficult), the committee also
<br>solicits "workshop track" papers. Accepted papers will be presented orally at the conference but will not
<br>appear in the proceedings. Submissions to this track that have previously appeared (or are currently
<br>submitted elsewhere) are acceptable, as long as they first appeared after January 1, 2014. Papers that
<br>describe work in progress are also welcome. We note that the same standards of quality will apply to
<br>conference and workshop papers.
<br>
<br>
<br>
<br>
<br>
<br>Instruction for Authors:
<br>- Conference Track: Submissions must not substantially duplicate work published elsewhere or submitted in
<br>parallel to a journal or any other conference/workshop that has proceedings. The submission must be
<br>anonymous, with no author names, affiliations, or obvious references. The length of the submission must be
<br>at most 12 pages excluding bibliography and appendices. The text must be in a single column format, use at
<br>least 11- point fonts, and have reasonable margins. The submission should begin with a title and a short
<br>abstract. The introduction should summarize the contributions of the paper at a level appropriate for a
<br>non-specialist reader. Committee members are not required to read appendices; the paper should be
<br>intelligible without them. Submissions should preferably be in PDF format. Instructions on how to submit
<br>will be provided on the web site.
<br>
<br>- Workshop Track: Authors may submit a paper published elsewhere or an original manuscript. As with the
<br>conference track, submissions should begin with a title and short abstract followed by an introduction that
<br>summarizes the contributions at a level appropriate for a non-specialist reader. Information about
<br>previous publication, if any, should be indicated on the first page of the submission. Beyond these
<br>guidelines no specific format is required. In particular, (a) papers previously published elsewhere may be
<br>submitted in their published form provided bibliographic information is clearly indicated; (b) short
<br>summaries of works available in other venues or online (on the arXiv or IACR eprint) are acceptable;
<br>(c) original submissions may be left anonymous at the discretion of the authors. (Previously published
<br>submissions cannot be anonymous.)
<br>
<br>
<br>There is no restriction on program committee member submissions to either track, though PC-authored papers
<br>will be held to a higher standard.
<br>
<br>
<br>
<br>
<br>
<br>Conference Organization (General and Program Co-Charis):
<br>- Anja Lehmann (IBM Research Zurich, Switzerland)
<br>- Stefan Wolf (USI Lugano, Switzerland)
<br>
<br>
<br>
<br>
<br>
<br>Program Committee:
<br>- Paulo Barreto (University of Sao Paulo, Brazil)
<br>- Mario Berta (Caltech, USA)
<br>- Anne Broadbent (University of Ottawa, Canada)
<br>- Roger Colbeck (University of York, UK)
<br>- Paolo D'Arco (University of Salerno, Italy)
<br>- Frederic Dupuis (Aarhus University, Denmark)
<br>- Stefan Dziembowski (University of Warsaw, Poland)
<br>- Sebastian Faust (EPF Lausanne, Switzerland)
<br>- Omar Fawzi (ENS Lyon, France)
<br>- Peter Gazi (IST, Austria)
<br>- Yuval Ishai (Technion, Israel)
<br>- Anja Lehmann (IBM Research Zurich, Switzerland)
<br>- Keith Martin (Royal Holloway, University of London, UK)
<br>- Prakash Narayan (University of Maryland, USA)
<br>- Anderson Nascimento (University of Washington Tacoma, USA)
<br>- Koji Nuida (AIST, Japan)
<br>- Frederique Oggier (NTU, Singapore)
<br>- Claudio Orlandi (Aarhus University, Denmark)
<br>- Carles Padro (Polytechnic University of Catalonia, Spain)
<br>- Rei Safavi-Naini (University of Calgary, Canada)
<br>- Marco Tomamichel (University of Sidney, Australia)
<br>- Stefan Wolf (USI Lugano, Switzerland)
<br>- Mark Zhandry (Stanford University, USA)