Ranking & Metrics Conference Call for Papers Other Conferences in United States
21st International Conference on Applied Cryptography and Network Security

21st International Conference on Applied Cryptography and Network Security

Kyoto , Japan

Submission Deadline: Thursday 12 Jan 2023

Conference Dates: Jun 19, 2023 - Jun 22, 2023

Research
Impact Score 3.20

OFFICIAL WEBSITE

Conference Organizers: Deadline extended?
Click here to edit

Ranking & Metrics Impact Score is a novel metric devised to rank conferences based on the number of contributing the best scientists in addition to the h-index estimated from the scientific papers published by the best scientists. See more details on our methodology page.

Research Impact Score: 3.20
Contributing Best Scientists: 55
H5-index:
Papers published by Best Scientists 59
Research Ranking (Computer Science) 179

Conference Call for Papers

Areas of interest for ACNS 2023 include but are not limited to:

Access control
Applied cryptography
Automated security analysis
Biometric security/privacy
Cloud security/privacy
Complex systems security
Critical infrastructure security
Cryptanalysis
Cryptographic primitives
Cryptographic protocols
Data protection
Database/system security
Digital rights management
Distributed security and consensus protocols
Email, app and web security
Future Internet security
Human factors in security
Identity management
IP protection
Internet fraud, cybercrime
Internet-of-Things (IoT) security
Intrusion detection
Key management
Malware
Mobile/wireless/5G security
Network security protocols
Post-quantum cryptography
Privacy/anonymity, PETs
Security/privacy metrics
Side-channel analysis and physical attacks
Trust management
Ubiquitous security/privacy
Usable security/privacy

Overview

Top Research Topics at Applied Cryptography and Network Security?

  • Computer security (38.25%)
  • Theoretical computer science (22.53%)
  • Cryptography (18.78%)

The primary areas of discussion in Applied Cryptography and Network Security are Computer security, Theoretical computer science, Cryptography, Encryption and Computer network. Applied Cryptography and Network Security addresses concerns in Computer security which are intertwined with other disciplines, such as Scheme (programming language) and Protocol (object-oriented programming). The research on Scheme (programming language) discussed in the event draws on the closely related field of Signature (logic).

The conference explores topics in Theoretical computer science which can be helpful for research in disciplines like Homomorphic encryption, Mathematical proof, Random oracle, Hash function and Computation. Research in the field of Algorithm was used to conduct the presented Cryptography study. The work on Algorithm presented in Applied Cryptography and Network Security focuses on Block cipher in particular.

Encryption, which encompasses Ciphertext, Attribute-based encryption and Probabilistic encryption, is the main subject of the event. The Authentication study featured in the conference draws parallels with the field of Password. The event connects the study in Public-key cryptography with the closely related area of Digital signature.

What are the most cited papers published at the conference?

  • Privacy preserving keyword searches on remote encrypted data (818 citations)
  • Secure Conjunctive Keyword Search over Encrypted Data (626 citations)
  • Identity-Based Proxy Re-encryption (599 citations)

Research areas of the most cited articles at Applied Cryptography and Network Security:

The conference publications investigate areas of study like Computer security, Cryptography, Theoretical computer science, Encryption and Public-key cryptography. In addition to Computer security research, the most cited articles aim to explore topics under Scheme (programming language) and Identity (object-oriented programming). Cryptosystem and Digital signature are some topics wherein Public-key cryptography research discussed in the conference publications has an impact.

Papers citation over time

A key indicator for each conference is its effectiveness in reaching other researchers with the papers published at that venue.

The chart below presents the interquartile range (first quartile 25%, median 50% and third quartile 75%) of the number of citations of articles over time.

Research.com

The top authors publishing at Applied Cryptography and Network Security (based on the number of publications) are:

  • Jianying Zhou (9 papers) published 3 papers at the last edition, 2 more than at the previous edition,
  • David Pointcheval (7 papers) published 1 paper at the last edition,
  • Mark Manulis (7 papers) published 2 papers at the last edition,
  • Goichiro Hanaoka (6 papers) absent at the last edition,
  • Kazuki Yoneyama (5 papers) absent at the last edition.

The overall trend for top authors publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top authors.

Research.com

Only papers with recognized affiliations are considered

The top affiliations publishing at Applied Cryptography and Network Security (based on the number of publications) are:

  • Chinese Academy of Sciences (16 papers) absent at the last edition,
  • Technische Universität Darmstadt (15 papers) absent at the last edition,
  • Ruhr University Bochum (12 papers) published 1 paper at the last edition the same number as at the previous edition,
  • Institute for Infocomm Research Singapore (12 papers) absent at the last edition,
  • École Normale Supérieure (11 papers) published 1 paper at the last edition.

The overall trend for top affiliations publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top affiliations.

Research.com

Publication chance based on affiliation

The publication chance index shows the ratio of articles published by the best research institutions at the conference edition to all articles published within that conference. The best research institutions were selected based on the largest number of articles published during all editions of the conference.

The chart below presents the percentage ratio of articles from top institutions (based on their ranking of total papers).Top affiliations were grouped by their rank into the following tiers: top 1-10, top 11-20, top 21-50, and top 51+. Only articles with a recognized affiliation are considered.

Research.com

During the most recent 2019 edition, 2.56% of publications had an unrecognized affiliation. Out of the publications with recognized affiliations, 15.79% were posted by at least one author from the top 10 institutions publishing at the conference. Another 5.26% included authors affiliated with research institutions from the top 11-20 affiliations. Institutions from the 21-50 range included 42.11% of all publications and 36.84% were from other institutions.

Returning Authors Index

A very common phenomenon observed among researchers publishing scientific articles is the intentional selection of conferences they have already attended in the past. In particular, it is worth analyzing the case when the authors participate in the same conference from year to year.

The Returning Authors Index presented below illustrates the ratio of authors who participated in both a given as well as the previous edition of the conference in relation to all participants in a given year.

Research.com

Returning Institution Index

The graph below shows the Returning Institution Index, illustrating the ratio of institutions that participated in both a given and the previous edition of the conference in relation to all affiliations present in a given year.

Research.com

The experience to innovation index

Our experience to innovation index was created to show a cross-section of the experience level of authors publishing at a conference. The index includes the authors publishing at the last edition of a conference, grouped by total number of publications throughout their academic career (P) and the total number of citations of these publications ever received (C).

The group intervals were selected empirically to best show the diversity of the authors' experiences, their labels were selected as a convenience, not as judgment. The authors were divided into the following groups:

  • Novice - P < 5 or C < 25 (the number of publications less than 5 or the number of citations less than 25),
  • Competent - P < 10 or C < 100 (the number of publications less than 10 or the number of citations less than 100),
  • Experienced - P < 25 or C < 625 (the number of publications less than 25 or the number of citations less than 625),
  • Master - P < 50 or C < 2500 (the number of publications less than 50 or the number of citations less than 2500),
  • Star - P ≥ 50 and C ≥ 2500 (both the number of publications greater than 50 and the number of citations greater than 2500).

Research.com

The chart below illustrates experience levels of first authors in cases of publications with multiple authors.

Research.com

Other Conferences in Japan

International Conference on Artificial Intelligence in Information and Communication

Feb 20, 2023 - Feb 23, 2023

Kumamoto , Japan, Japan

Deadline: Saturday 15 Oct 2022

Previous Editions

Something went wrong. Please try again later.