ICISC: International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2023 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
ICISC 2022 25th Annual International Conference on Information Security and Cryptology
Nov 30, 2022 - Dec 2, 2022 Hotel Koreana, Seoul Sep 2, 2022
ICISC 2018 International Conference on Information Security and Cryptology
Nov 28, 2018 - Nov 30, 2018 Seoul, Korean Aug 29, 2018
ICISC 2016 The 19th Annual International Conference on Information Security and Cryptology
Nov 30, 2016 - Dec 2, 2016 Seoul, Korea Aug 26, 2016
ICISC 2015 The 18th Annual International Conference on Information Security and Cryptology
Nov 25, 2015 - Nov 27, 2015 Seoul, Korea Aug 31, 2015
ICISC 2014 The 17th Annual International Conference on Information Security and Cryptology
Dec 3, 2014 - Dec 5, 2014 Seoul, Korea Sep 4, 2014
ICISC 2013 The 16th Annual International Conference on Information Security and Cryptology
Nov 27, 2013 - Nov 29, 2013 Seoul, Korea Sep 9, 2013
ICISC 2012 International Conference on Information Security and Cryptology
Nov 28, 2012 - Nov 30, 2012 Seoul, Korea Aug 28, 2012
 
 

Present CFP : 2022

Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2022, the 25th Annual International Conference on Information Security and Cryptology which is sponsored by KIISC (Korean Institute of Information Security and Cryptology), Korea.

● Cryptography Track
- Authentication and Authorization
- Biometrics
- Blockchain Security
- Block and Stream Ciphers
- Copyright Protection
- Cryptographic Protocols
- Cryptanalysis
- Digital Forensics
- Digital Signature
- Distributed Systems Security
- Efficient Cryptography Implementation
- Functional encryption
- Hash Function
- Homomorphic Encryption
- ID-based Cryptography
- Intrusion Detection and Prevention
- Information Hiding
- Key Management
- Post-quantum cryptography
- Privacy Enhancement
- Public Key Cryptography
- Side Channel Attacks and Countermeasures
- Secure Multiparty Computation
- Software Security
- Smart Device Security
- Zero-knowledge proofs

● Security Track
- Analysis of network and security protocols
- Anonymity and censorship-resistant technologies
- Applications of cryptographic techniques
- Authentication and authorization
- Automated tools for source code/binary analysis
- Automobile security
- Botnet defense
- Critical infrastructure security
- Denial-of-service attacks and countermeasures
- Embedded systems security
- Exploit techniques and automation
- Hardware and physical security
- HCI security and privacy
- Malware analysis
- Mobile/wireless/cellular system security
- Network-based attacks
- Network infrastructure security
- Operating system security
- Practical cryptanalysis (hardware, DRM, etc.)
- Security policy
- Techniques for developing secure systems
- Trustworthy computing
- Trusted execution environments
- Unmanned System Security
- Vulnerability research
- Web Security
 

Related Resources

ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
InCIT 2024   The 8th International Conference on Information Technology
BIoT 2024   5th International Conference on Block chain and Internet of Things
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
LAJC 2024   Latin-American Journal of Computing
CRBL 2024   International Conference on Cryptography and Blockchain
MLT 2024   5th International Conference on Machine Learning & Trends
ICISE 2024   ACM--2024 9th International Conference on Information Systems Engineering (ICISE 2024)
Hacktivity 2024   Hacktivity 2024 - IT Security Festival