logo

In honor of Professor Thierry BERGER
International Conference in "Codes, Cryptology and Information Security"

           style=

Mohammed V University, Rabat, Morocco
Faculty of Sciences
May 26 - 28, 2015

Download Poster of C2SI-BERGER2015

    style=

C2SI-Berger2015 is in cooperation with
International Association for Cryptologic Research "IACR"

    style= LNCS, Volume 9084, 2015 "Codes, Cryptology, and Information Security"
Conference Program
Visit Atlas



PAPER SUBMISSION

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or other conference or workshop that has proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Accepted submissions must not appear in any other conference or workshop with proceedings. The submission must be in English. It must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Submissions not meeting these guidelines risk rejection without consideration of their merits. Since the final version of accepted papers will have to follow the LNCS guidelines in LaTeX with a total page limit of 18 pages including references and appendices, it is advised to submit in the same format. Committee members are not required to review more than that, so the paper should be intelligible and self-contained within this length.

Information about LNCS format can be found on
http://www.springer.de/comp/lncs/authors.html

Papers must be submitted electronically through
https://easychair.org/conferences/?conf=c2siberger2015

Submissions must conform to this procedure. Late submissions and non-electronic submissions will not be considered. Authors of accepted papers must guarantee that their paper will be presented at the conference.

CONFERENCE PROCEEDINGS

Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers.

CONFERENCE TOPICS

Topics of interest include but are not limited to:

Coding theory
Cryptography
Cryptosystems based on codes
Spread spectrum
LFSR, F-FCSR
Steganography
Information Security
Identification, Authentication and Non-repudiation
Information Hiding
Intrusion Detection & Prevention
Privacy
Security and Privacy
Security Protocols
Mobile Security
Ad Hoc Network Security

IMPORTANT DATES

New Submission deadline: February 15, 2015 23:59 pm (GMT Time)
Authors Notification: March 20, 2015
Camera Ready: March 25, 2015
Early Registration: April 15, 2015


Conference Date: 26 - 28 May, 2015

Sponsors

International Conference in "Codes, Cryptology and Information Security" in Honor of Professor Thierry BERGER
Contact :    elhajji(at)fsr.ac.ma,    emsouidi(at)gmail.com,    orhanou(at)fsr.ac.ma