posted by user: homaei || 537 views || tracked by 2 users: [display]

ISCISC 2024 : The 21st International ISC Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle

Link: https://iscisc2024.modares.ac.ir/en
 
When Oct 16, 2024 - Oct 17, 2024
Where Tehran, Iran
Submission Deadline Jun 15, 2024
Notification Due Aug 14, 2024
Categories    cyber security   computer security   privacy   computer science
 

Call For Papers

ISCISC is an annual international conference that explores the field of information and communication security research. It actively invites submissions from both academia and industry, highlighting groundbreaking studies across a wide spectrum of topics. These encompass the theoretical foundations and practical applications of cyber security. The topics of interest include, but are not limited to:
- Foundations of cryptology:
--- Symmetric cryptographic algorithms
--- Asymmetric and cryptographic algorithms and digital signatures
--- Hash functions
--- Information-theoretic security
--- New methods in cryptography (functional cryptography, homomorphic cryptography, ...)
- Implementation of cryptographic algorithms and related attacks:
--- Software and hardware implementation of cryptographic algorithms
--- Side channel attacks and countermeasures
--- Embedded cryptographic systems
--- Hardware tampering and countermeasures
--- Cryptographic hardware accelerators
--- Cryptographic implementation analysis
- Network security
--- Mobile and wireless network security
--- Network infrastructure security
--- Network intrusion detection and prevention
--- Denial-of-service attacks and countermeasures
--- Security analysis of network protocols
- Security protocols
--- Authentication and identification protocols
--- Anonymity, privacy, and trust management
--- Zero-knowledge protocols and proofs
--- Secure multiparty computation
--- Cryptanalysis of security protocols
--- Attacks against security protocols
--- Formal verification of security protocols
- Security methods and models
--- Access control and authorization
--- Anonymity, privacy, and trust management
--- Security and privacy policies and metrics
--- Threat modeling and analysis
--- Trust and security models
--- Formal methods and models
- Security of computation
--- Hardware security
--- Operating system security
--- Database security
--- Web security
--- Mobile application security
--- Fuzzing and vulnerability discovery
--- Malware Analysis
- Security and privacy management
--- Information security management system
--- Security architectures
--- Risk Management
--- Information security training
--- E-business and e-banking security
--- E-health security
--- E-banking security
--- E-learning security
--- Privacy-Enhancing Technologies
- Information hiding
--- Steganography and watermarking
--- Steganalysis
--- Applications of Information hiding
- Digital forensics
--- Digital forensics techniques and tools
--- Database and network forensics
--- Mobile device forensics
--- Cybercrime forensics
- Recent topics in cryptography and security
--- Quantum and Post-quantum cryptography
--- Artificial Intelligence (AI) Security and privacy
--- Blockchain technology and cryptocurrency
--- Internet of Things (IoT), big data and cloud security
--- Cyber-physical systems security
--- Adversarial machine learning
--- Security of social networks, metaverse, and augmented reality-based networks

The International ISC Conference on Information Security and Cryptology welcomes researchers, developers, and practitioners to submit their original papers and organize workshops on all aspects of cryptology and information security. For each accepted paper, at least one author must register for the conference and ensure that their paper is presented in-person. Non-local authors have the opportunity to present their papers online. Accepted papers will be published in a special issue of the ISeCure journal (indexed in WoS-JCR, SCImago-SJR, and Scopus among other indexing services.)

All manuscripts must be submitted in EDAS (https://edas.info/N31896). Submitted papers must not substantially overlap with papers that have already been published or accepted for publication, or that are simultaneously under review by a journal, conference, or workshop with published proceedings. Submissions must be a PDF file in ISeCure format (https://www.isecure-journal.com/journal/authors.note), no more than 8 pages long (up to 11 pages is acceptable with extra-page fee). Each paper submitted for evaluation to the conference is expected to obtain three quality reviews.

Related Resources

Ei/Scopus-AACIP 2024   2024 2nd Asia Conference on Algorithms, Computing and Image Processing (AACIP 2024)-EI Compendex
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
InCIT 2024   The 8th International Conference on Information Technology
LAJC 2024   Latin-American Journal of Computing
GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
CyberHunt 2024   7th Annual Workshop on Cyber Threat Intelligence and Hunting in conjunction with the IEEE Big Data Conference
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
Springer ICIM 2025   Springer--2025 the 11th International Conference on Information Management (ICIM 2025)
DSDE 2025   2025 The 8th International Conference on Data Storage and Data Engineering (DSDE 2025)