logo

4月14日 - 2025年4月18日

排名: A (CORE2023)Offline

Financial Cryptography and Data Security Conference

更新于:12 days ago
0.0 (0 评分)
Hotel Shigira Mirage, Miyakojima, JapanInternational Financial Cryptography Association

暂无关注者。

概览

The Financial Cryptography and Data Security 2025 conference (FC 2025), organized by the International Financial Cryptography Association (IFCA), will be held in Miyakojima, Japan, from April 14-18, 2025. The conference focuses on information assurance, especially in commercial contexts, covering topics from applied cryptography to blockchain applications. FC 2025 seeks original research and encourages interdisciplinary works.

论文征集

Call for Papers

Financial Cryptography and Data Security 2025

Twenty-Ninth International Conference

14–18 April 2025

Hotel Shigira Mirage, Miyakojima, Japan

Important Dates

  • Paper submission: October 8, 2024
  • Paper notification: December 6, 2024
  • Final pre-proceedings papers: February 14, 2025
  • Workshop and tutorial submission: September 13, 2024
  • Workshop and tutorial notification: September 27, 2024
  • Conference: April 14–18, 2025

Satoshi Grace Period

Due to a projected event on the Ethereum's Beacon Chain on October 4th, 2024, the paper submission deadline may be extended as follows:

  • Number 0, 1: October 8 (original deadline)
  • Number 2, 3, 4: October 9
  • Number 5, 6, 7, 8, 9: October 10
  • Number A, B, C, D, E, F: October 11

The random number in slot 10100000 is 0x8fbc79eb733d3fef8d218a0924bda4a0ff676317790dc58c278a462f7d9c03aed1618be49df1fd77e44f0c8ef260e0ea14c7bda670d0262cc473a6a87b67eb21dcef93e75dd29d98f1c3872432e9de58e2b20f602795baa551c082cea435d52e and the FC25 submission deadline is thus October 11, 2024.

Topics

  • Access control, authorization and trust management
  • Anonymity and privacy enhancing technologies
  • Applied cryptography
  • Attacks, attack techniques, and attack case studies
  • Auctions and incentive design
  • Authentication, identity management and biometrics
  • Behavioral aspects of security and privacy
  • Blockchain applications
  • Blockchain protocols, proof-of-work, -stake, -burn
  • Censorship circumvention and resistance
  • Central bank digital currency (CBDC)
  • Certification and audits
  • Cloud computing and data outsourcing security
  • Cryptographic protocols
  • Data security and privacy
  • Decentralized finance (DeFi)
  • Digital cash and payment systems
  • Digital rights management
  • Distributed consensus protocols
  • Economic and monetary aspects of cryptocurrencies
  • Economics of security and privacy
  • Electronic crime and underground markets
  • Electronic payments and ticketing systems
  • Empirical studies, real-world measurements and metrics
  • Forensics, monitoring and transaction graph analysis
  • Fraud detection and management
  • Game theory for security, privacy, and blockchain
  • Language-based security and formal verification
  • Legal and regulatory issues of blockchains, cryptocurrencies, and electronic payments
  • Machine learning and AI security
  • Malware and software security
  • Mobile payments
  • Network and distributed system security
  • Phishing and social engineering
  • Scalability and interoperability of cryptocurrencies
  • Security of banking, financial services, and electronic commerce
  • Security of peer-to-peer networks
  • Smart contracts and financial instruments
  • Smartcards, secure tokens, and secure hardware
  • Surveillance and tracking
  • System security
  • Trusted execution environments (TEE), their security and applications
  • Usability and security
  • Web security
  • Zero-knowledge proofs

Submission

Contributions are sought in the following categories:

  • Research papers: regular papers (15 pages + references and appendices),
    short papers (8 pages + references; no appendices), and
    systematization of knowledge (SoK) papers (20 pages + references and appendices)
  • Workshop proposals (2 pages)
  • Tutorial proposals (2 pages)

Research Papers

  • Regular papers, short papers, and SoKs must be submitted through the conference submission website.
  • Regular research papers (15 pages + references and appendices)
  • Short papers (8 pages + references; no appendices)
  • Systematization of knowledge (SoK) papers (20 pages + references and appendices)

Workshop and Tutorial Proposals

Workshop and tutorial proposals should be sent by email to fc25workshops@ifca.ai.

General Information

  • For each accepted paper, the conference requires at least one registration at the general or academic rate.
  • Paper authors must sign the IFCA copyright form when submitting the final version.
  • Individual papers can be published as fully open access—the publisher charges authors a fee for this.

Format

  • Papers must be formatted in standard LNCS format (templates) and submitted as PDF files. Submissions in other formats will be rejected.
  • All papers must be submitted electronically according to the instructions and forms found here and at the submission site.

Anonymous Submission

  • Regular and short research paper submissions as well as SoKs must be anonymized with no author names, affiliations, acknowledgments, or obvious references.
  • Failure to properly anonymize submitted papers is grounds for a desk rejection without review.
  • Program committee members will be instructed not to actively seek to de-anonymize papers.

Original Submissions

  • Authors may submit only work that does not substantially overlap with work that is currently submitted or has been accepted for publication to any other peer-reviewed conference/workshop with proceedings or a journal.
  • Double submission is considered serious research fraud.
  • It is acceptable for papers to appear in non-peer-reviewed formats (e.g., as technical reports or in online archives such as ePrint).

Ethics and Etiquette

Authors are required to read and follow this information on ethics and etiquette.

Conflict of Interest

  • Authors must report in the submission site any conflicts with program committee members.
  • PC members will not be able to review, read the reviews of, or participate in discussions of papers they are conflicted with.
  • The review process for papers conflicted with both PC chairs will be managed by another PC member designated as the "conflict chair".

Evaluation Criteria

Regular Research Papers

Research papers should describe novel, previously unpublished scientific contributions to the field, and they will be subject to rigorous peer review. Accepted submissions will be included in the conference proceedings to be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series. Submissions are limited to 15 pages in standard LNCS format excluding references and appendices.

Short Papers

  • Short papers are also subject to peer review.
  • Short papers will be evaluated with a focus on novelty and potential for sparking participants' interest and future research avenues.
  • Short paper submissions are limited to 8 pages in standard LNCS format, excluding references.
  • The title for short papers must begin with the text "Short Paper:"
  • Accepted submissions will be included in the conference proceedings.

Systematization of Knowledge Papers

  • SoK articles must provide an added value beyond a literature review, such as novel insights, identification of research gaps, or challenges to commonly held assumptions.
  • SoK paper submissions are limited to 20 pages in standard LNCS format excluding references and appendices.
  • The paper title for systematization of knowledge papers must begin with the text "SoK:"

重要日期

会议日期

Conference Date

2025年4月14日2025年4月18日

投稿

Workshop and tutorial submission

2024年9月13日

Paper submission

2024年10月11日

通知

Workshop and tutorial notification

2024年9月27日

Paper notification

2024年12月6日

终稿

Final pre-proceedings papers

2025年2月14日

来源排名

来源: CORE2023

排名: A

研究领域: Cybersecurity and privacy

地图

Loading feedback section...