ICISC: International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
ICISC 2016 The 19th Annual International Conference on Information Security and Cryptology
Nov 30, 2016 - Dec 2, 2016 Seoul, Korea Aug 26, 2016
ICISC 2015 The 18th Annual International Conference on Information Security and Cryptology
Nov 25, 2015 - Nov 27, 2015 Seoul, Korea Aug 31, 2015
ICISC 2014 The 17th Annual International Conference on Information Security and Cryptology
Dec 3, 2014 - Dec 5, 2014 Seoul, Korea Sep 4, 2014
ICISC 2013 The 16th Annual International Conference on Information Security and Cryptology
Nov 27, 2013 - Nov 29, 2013 Seoul, Korea Sep 9, 2013
ICISC 2012 International Conference on Information Security and Cryptology
Nov 28, 2012 - Nov 30, 2012 Seoul, Korea Aug 28, 2012
ICISC 2011 The 14th Annual International Conference on Information Security and Cryptology
Nov 30, 2011 - Dec 2, 2011 Seoul, South Korea Aug 31, 2011
 
 

Present CFP : 2016

ICISC 2016
Call for papers
The 19th Annual International Conference on Information Security and Cryptology
November 30 (Wed) ~ December 2 (Fri), 2016, Seoul, Korea
http://www.icisc.org/
Organizing Committee Chair: Okyeon Yi (Kookmin University, Korea)
PC Co-chairs: Seokhie Hong (Korea University, Korea), Jong Hwan Park (Sangmyung University, Korea)
Submission August 26, 2016 18:00 KST (GMT + 9 hr)
Acceptance notification October 21, 2016
Proceedings version deadline November 4, 2016
ICISC 2016 Conference November 30 ~ December 2, 2016
Original research papers on all aspects of theory and applications of information security and cryptology are solicited for
submission to ICISC 2016, the 19th Annual International Conference on Information Security and Cryptology which is sponsored
by KIISC (Korean Institute of Information Security and Cryptology), Korea. Especially, ICISC 2016 will plan to organize a special
session on the subject of post-quantum cryptography.
● Post-quantum cryptography
● Biometrics
● Cloud Computing Security
● Cryptanalysis
● Digital Forensics
● Distributed Systems Security
● Electronic Commerce
● Homomorphic Encryption
● ID-based Cryptography
● Intrusion Detection and Prevention
● Mobile Security
● Public Key Cryptography
● Side Channel Attacks and Countermeasures
● Software Security
● Authentication and Authorization
● Block and Stream Ciphers
● Copyright Protection
● Cryptographic Protocol
● Digital Signature
● Efficient Implementation
● Hash Function
● Identity Management
● Information Hiding
● Key Management
● Privacy Enhancement
● Secure Multiparty Computation
● Social Network Security
● Smart Device Security
Submissions must not substantially duplicate work that any of the authors have published elsewhere or submitted in parallel to
any other conference or workshop that has proceedings. The paper should start with a title, an abstract and keywords, but must
be anonymous. The length of the submission should not exceed 12 pages excluding the bibliography and clearly marked
appendices, using at least 10 point fonts and reasonable margins. Since committee members are not required to read the
appendices, the paper should be intelligible without them. All papers must be in PDF format. It is strongly recommended that
submissions be processed using LaTeX2e according to the instruction at http://www.springer.de/comp/lncs/authors.html.
Authors of accepted papers must guarantee that their paper will be presented at the conference.
CONFERENCE PROCEEDINGS
INSTRUCTIONS for AUTHORS
TOPICS of INTEREST INCLUDE, but are not limited to:
OVERVIEW
IMPORTANT DATES
The proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science.
 

Related Resources

CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
EuropeanSeC 2017   2017 European Security Conference
CYBERINTEL 2017   CFC: Technological Advancements for Intelligence Collection, Analysis, and Dissemination
ICONIP 2017   International Conference on Neural Information Processing
CANS 2016   15th International Conference on Cryptology and Network Security
ICITA 2017   International Conference on Information Technology and Applications
IJISS 2016   International Journal of Information Security Science (IJISS)
ACISP 2017   Australasian Conference on Information Security and Privacy
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
RecSys 2017   RecSys 2017 : 11th ACM Conference on Recommender Systems