posted by organizer: ghiet || 32 views || tracked by 1 users: [display]

ISC 2026 : The 29th Information Security Conference (ISC)

FacebookTwitterLinkedInGoogle

Link: https://isc2026.github.io/
 
When Oct 28, 2026 - Oct 30, 2026
Where Rennes, France
Submission Deadline Jun 22, 2026
Notification Due Aug 31, 2026
Final Version Due Sep 14, 2026
Categories    computer security   cryptography   system security   cybersecurity
 

Call For Papers

**********************************************************************
29th Information Security Conference (ISC 2026)
Rennes, France -- 26-29 October, 2026
https://isc2026.github.io/
**********************************************************************

Important Dates
----------------

Submission Deadline: June 22 (11.59pm AoE)
Notification: August 31
Camera-Ready Deadline: September 14
Conference: October 28-30, FR

Overview
---------

The Information Security Conference (ISC) is an annual international
conference covering research in theory and applications of Information
Security. ISC aims to attract high quality papers in all technical
aspects of information security. It was first initiated as a workshop
in Tatsunokuchi, Ishikawa, Japan in 1997, and then continued in Kuala
Lumpur, Malaysia, and Wollongong, Australia. It then changed to the
current conference format when it was held in Malaga, Spain in 2001.
Further information about past ISC events is available through DBLP,
at https://dblp.uni-trier.de/db/conf/isw/


We are looking for papers with high-quality, original, and unpublished
research contributions. This includes submissions from academia,
industry and government on traditional as well as emerging topics and
new paradigms in these areas, with a clear connection to real-world
problems, systems, or applications.


Organizing Team
----------------

General Chair
Guillaume Hiet (CentraleSupélec/Inria)

Program Chairs
Joaquin Garcia-Alfaro (Institut Polytechnique de Paris)
Mehdi Tibouchi (NTT)

Steering Committee
Hyungjoon Koo (Sungkyunkwan University)
Zhiqiang Lin (The Ohio State University)
Javier Lopez (University of Malaga)
Masahiro Mambo (Kanazawa University)
Eiji Okamoto (University of Tsukuba)
Michalis Polychronakis (Stony Brook University)
Willy Susilo (University of Wollongong)
Jianying Zhou (Singapore University of Technology and Design)

Publications Chair
Rubén Salvador, CentraleSupélec, France

Publicity Chairs
Kaitai Liang (UTU / TU Delft)
Wenjuan Li (Education University of Hong Kong)
Paria Shirani (University of Ottawa)

Web Chair
Thomas Rokicki (CentraleSupélec)

Local Organization
Lydie Mabil (Inria)

Program Committee
Soon available at https://isc2026.github.io/committee/


Types of Submissions Solicited
------------------------------------------
Papers on all technical aspects of information security, cryptography,
and privacy are solicited for submission. Areas of interest include,
but are not limited to:


- access control - formal methods - post-quantum cryptography
- anonymity - foundations of cybersecurity - privacy
- applied cryptography - functional encryption - PETs
- attribute-based cryptography - hardness assumptions - protocols
- automated security analysis - homomorphic encryption - public-key cryptography
- biometric security - identity-based cryptography - real-world cryptography
- blockchain - identity management - secure messaging
- certification - implementations - secure voting
- cloud computing - indistinguishability - security proofs
- containerization - Internet security - side-channel attacks
- critical infrastructures - intrusion detection - software security
- cryptanalysis - key management - standardization
- cryptocurrency - malware - symmetric-key cryptography
- cybercrime - mathematical aspects - threshold cryptography
- database/system security - micro-architectural attacks - trusted execution
- decentralized systems - mobile/wireless/5G security - unlinkability
- downgrade attacks - multilinear maps - usability
- embedded platforms - multi-party computation - vulnerabilities
- fault attacks - networks security - web security
- fingerprinting - OS and systems security - zero-knowledge proofs


Best Paper Awards
--------------------------
Accepted papers will be judged and ranked by the Program Committee.
The best papers will be considered for Best Paper Awards (thanks to
the gracious support from our sponsors).


Instructions for Authors
-------------------------------

Submissions must be original work and may not be under submission to
another journal or conference with proceedings at the time of review.
Submissions must be in the Springer Lecture Notes in Computer Science
(LNCS) style, with the default margins and fonts, but with the
addition of page numbers (e.g., by adding \pagestyle{plain}). They are
limited to 16 pages excluding bibliography and appendices, and to 20
pages including bibliography and appendices. Optionally, any amount of
clearly marked supplementary material may be supplied, following the
main body of the paper, but reviewers are not required to read this
supplementary material and submissions are expected to be intelligible
and complete without it.


Make sure to use the official templates from:

https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines

Authors should consult Springer’s authors’ guidelines and use their
LaTeX proceedings template. Springer encourages authors to include
their ORCIDs in their papers. Submitted papers must be in PDF format
and submitted electronically via the ISC 2026 submission system
(https://easychair.org/conferences/?conf=isc2026). The submission must
be anonymous with no author names, affiliations, or obvious
references.


For papers that are accepted, the corresponding author must, acting on
behalf of all of the authors of that paper, complete and sign a
Consent-to-Publish form, through which the copyright for their paper
is transferred to Springer. The corresponding author signing the
copyright form should match the corresponding author marked on the
paper. Once the files have been sent to Springer, changes relating to
the authorship of the papers cannot be made. Moreover, authors of
accepted papers must guarantee that their paper will be presented at
the conference.


Before you Submit your Paper
-----------------------------------------

Authors are strongly advised to pay careful attention to the following
points:

- double-blind review process (anonymous submission without obvious references);
- in-person only conference (authors of accepted papers must guarantee attendance);
- any paper that is not presented (no-show) will be excluded from the proceedings;
- use the correct LNCS template and do not modify the original margins;
- strictly respect the page limits.

In case of doubts or questions, please contact the PC chairs at isc2026@easychair.org

Use of generative AI and LLMs
------------------------------------------

Authors must carefully minimize the use of AI and LLM tools and verify
that all content and results are accurate and supported by evidence.
Papers containing hallucinated citations, or any other invented or
fabricated claims will be desk rejected. Authors retain full
responsibility for the accuracy, originality, and integrity of the
work. In case of doubts or questions, please contact the PC chairs at
isc2026@easychair.org


For further details, please visit:

https://isc2026.github.io/call-for-papers/

or contact us at isc2026@easychair.org

Related Resources

Cyber-AI 2026   The 2nd IEEE 2026 International Conference on Cybersecurity and AI-Based Systems (Scopus)
ICBTA 2026   2026 9th International Conference on Blockchain Technology and Applications (ICBTA 2026)
IJNSA 2026   International Journal of Network Security & Its Applications - ERA Indexed, H Index - 52
SIET 2026   he 11th International Conference on Sustainable Information Engineering and Technology
CSACN 2026   2026 International Conference on Communication System and Communication Network-EI/Scopus
ICCFI 2026   2026 The 10th International Conference on Communications and Future Internet (ICCFI 2026)
SAFER 2026   Workshop on Sustainable security and Awareness For nExt generation infRastructures (SAFER 2026)
ACM CCIOT 2026   ACM--2026 11th International Conference on Cloud Computing and Internet of Things (CCIOT 2026)
ICCNT--EI 2026   2026 10th International Conference on Communication and Network Technology (ICCNT 2026)
BIoT 2026   7th International Conference on Block chain and Internet of Things Applications