| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
All CFPs on WikiCFP | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Present CFP : 2024 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.
Types of Submissions Solicited ------------------------------------------ Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to: access control | formal methods | post-quantum cryptography anonymity | foundations | privacy applied cryptography | functional encryption | privacy-enhancing technologies attribute-based cryptography | hardness assumptions | protocols automated security analysis | homomorphic encryption | public-key cryptography biometric security | identity-based cryptography | real-world cryptography blockchain | identity management | secure messaging certification | implementations | secure voting cloud computing | indistinguishability obfuscation | security proofs containerization | Internet security | side-channel attacks critical infrastructures | intrusion detection | software security cryptanalysis | key management | standardization cryptocurrency | malware | symmetric-key cryptography cybercrime | mathematical aspects | threshold cryptography database/system security | micro-architectural attacks | trusted execution decentralized systems | mobile/wireless/5G security | unlinkability downgrade attacks | multilinear maps | usability embedded platforms | multi-party computation | vulnerabilities fault attacks | networks security | web security fingerprinting | OS and systems security | zero-knowledge proofs Deadlines ------------------------------------------ Submission Deadline: June 6, 2024, AoE Rebuttal: July 16-19, 2024 Notification: July 30, 2024, AoE Camera-Ready Deadline: August 15, 2024, AoE Conference: October 23-25, 2024 Best Paper Award ------------------------------------------ Accepted papers will be judged and ranked by the Program Committee. The best papers will be considered for the Best Paper Award (thanks to the gracious support from Springer). Instructions for Authors ------------------------------------------ Submissions must be original work and may not be under submission to another journal or conference with proceedings at the time of review. Submissions must be in the Springer Lecture Notes in Computer Science (LNCS) style, with the default margins and fonts, but with the addition of page numbers (e.g., by adding \pagestyle{plain}). They are limited to 16 pages excluding bibliography and appendices, and to 20 pages including bibliography and appendices. Optionally, any amount of clearly marked supplementary material may be supplied, following the main body of the paper, but reviewers are not required to read this supplementary material and submissions are expected to be intelligible and complete without it. Authors should consult Springer’s authors’ guidelines and use their LaTeX proceedings template. Springer encourages authors to include their ORCIDs in their papers. Submitted papers must be in PDF format and submitted electronically via the ISC 2024 submission system (HotCRP). The submission must be anonymous with no author names, affiliations, or obvious references. For papers that are accepted, the corresponding author must, acting on behalf of all of the authors of that paper, complete and sign a Consent-to-Publish form, through which the copyright for their paper is transferred to Springer. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made. Moreover, authors of accepted papers must guarantee that their paper will be presented at the conference. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|