ISC: Information Security Conference

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2025 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
ISC 2024 27th Information Security Conference
Oct 23, 2024 - Oct 25, 2024 Arlington, VA, USA Jun 13, 2024
ISC 2019 22nd Information Security Conference
Sep 16, 2019 - Sep 18, 2019 New York Apr 5, 2019
ISC 2018 21st Information Security Conference
Sep 9, 2018 - Sep 12, 2018 London (Guildford) Apr 16, 2018
ISC 2017 20th International Information Security Conference
Nov 22, 2017 - Nov 24, 2017 Ho Chi Minh city, Vietnam Jul 7, 2017
ISC 2016 The 19th Information Security Conference
Sep 7, 2016 - Sep 9, 2016 Honolulu, HI, USA Mar 7, 2016
ISC 2015 The Eighteenth Information Security Conference (ISC 2015)
Sep 9, 2015 - Sep 11, 2015 Trondheim, Norway May 4, 2015
ISC 2014 17th Information Security Conference
Oct 12, 2014 - Oct 14, 2014 Hong Kong Jun 25, 2014
ISC 2012 The 15th Information Security Conference
Sep 19, 2012 - Sep 21, 2012 Passau, Germany May 7, 2012
ISC 2011 14th Information Security Conference
Oct 26, 2011 - Oct 29, 2011 Xi’an, China May 22, 2011
ISC 2010 Information Security Conference
Oct 25, 2010 - Oct 28, 2010 Boca Raton Jun 29, 2010
ISC 2009 12th Information Security Conference
Sep 7, 2009 - Sep 9, 2009 Pisa, Italy Mar 31, 2009
ISC 2008 The 11th Information Security Conference
Sep 15, 2008 - Sep 18, 2008 Taipei, Taiwan Mar 1, 2008
 
 

Present CFP : 2024

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.


Types of Submissions Solicited
------------------------------------------
Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:

access control | formal methods | post-quantum cryptography
anonymity | foundations | privacy
applied cryptography | functional encryption | privacy-enhancing technologies
attribute-based cryptography | hardness assumptions | protocols
automated security analysis | homomorphic encryption | public-key cryptography
biometric security | identity-based cryptography | real-world cryptography
blockchain | identity management | secure messaging
certification | implementations | secure voting
cloud computing | indistinguishability obfuscation | security proofs
containerization | Internet security | side-channel attacks
critical infrastructures | intrusion detection | software security
cryptanalysis | key management | standardization
cryptocurrency | malware | symmetric-key cryptography
cybercrime | mathematical aspects | threshold cryptography
database/system security | micro-architectural attacks | trusted execution
decentralized systems | mobile/wireless/5G security | unlinkability
downgrade attacks | multilinear maps | usability
embedded platforms | multi-party computation | vulnerabilities
fault attacks | networks security | web security
fingerprinting | OS and systems security | zero-knowledge proofs


Deadlines
------------------------------------------
Submission Deadline: June 6, 2024, AoE
Rebuttal: July 16-19, 2024
Notification: July 30, 2024, AoE
Camera-Ready Deadline: August 15, 2024, AoE
Conference: October 23-25, 2024


Best Paper Award
------------------------------------------
Accepted papers will be judged and ranked by the Program Committee. The best papers will be considered for the Best Paper Award (thanks to the gracious support from Springer).


Instructions for Authors
------------------------------------------
Submissions must be original work and may not be under submission to another journal or conference with proceedings at the time of review. Submissions must be in the Springer Lecture Notes in Computer Science (LNCS) style, with the default margins and fonts, but with the addition of page numbers (e.g., by adding \pagestyle{plain}). They are limited to 16 pages excluding bibliography and appendices, and to 20 pages including bibliography and appendices. Optionally, any amount of clearly marked supplementary material may be supplied, following the main body of the paper, but reviewers are not required to read this supplementary material and submissions are expected to be intelligible and complete without it.

Authors should consult Springer’s authors’ guidelines and use their LaTeX proceedings template. Springer encourages authors to include their ORCIDs in their papers. Submitted papers must be in PDF format and submitted electronically via the ISC 2024 submission system (HotCRP). The submission must be anonymous with no author names, affiliations, or obvious references.

For papers that are accepted, the corresponding author must, acting on behalf of all of the authors of that paper, complete and sign a Consent-to-Publish form, through which the copyright for their paper is transferred to Springer. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made. Moreover, authors of accepted papers must guarantee that their paper will be presented at the conference.
 

Related Resources

SEAS 2025   14th International Conference on Software Engineering and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
SECRYPT 2025   22nd International Conference on Security and Cryptography
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)