ISCISC 2011 : 8th International ISC Conference on Information Security and Cryptology
Call For Papers
The International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) is an opportunity for researchers to share their contemporary knowledge in information security and cryptology area. The 8th ISCISC conference (ISCISC’11) is organized by Ferdowsi University of Mashhad in co-operation with ISC and will be held in Mashhad.
The purpose of ISCISC 2011, the International ISC Conference on Information Security and Cryptology, is to bring together researchers, engineers and practitioners interested in various aspects of information security and cryptology. The conference aims to provide an opportunity for academicians and specialists in a national and international scope to meet and discuss the latest developments in theory, emerging technologies, and progress in standards, services and their applications in various areas of information security. Special sessions, case-studies and tutorials dedicated to technical/scientific topics related to the conference are also envisaged. Researchers interested in organizing a special session or holding a tutorial, or companies interested in presenting their products/methodologies are invited to contact the conference secretariat.
ISCISC 2011 Topics
Fundamentals of Cryptology Fundamentals of Cryptography Information Hiding Information Hiding Algorithms (Steganography, Watermarking, Covert, Channel, …)
Private Key Encryption Algorithms Analysis and Evaluation
Public Key Encryption Algorithms Implementation and applications to hide information
Cryptanalysis and Evaluation Cryptography & Security Protocols Authorization, Identification and Authentication
Cryptography function (Hashing, Authenticity Verification Code, …) Privacy and Anonymity
Implementation of Cryptograpy Algorithms Hardware Implementation Cryptography Algorithms Availability
Software Implementation Cryptography Algorithms Access Control and Trust Management
Embedded System Cryptography Formal Methods in Information Security
Security of Systems & Applications Operating System Security Security Management Vulnerabilities & Penetration Test
Database Security Secure Software Engineering / Software Security
Network Security Social Engineering & Security
E-Business Security ISMS
Security in New Computational Environments Security Training
Auditing, Intrusion Detection & Prevention Other Related Topics
All submitted papers (max. 6 pages) are reviewed and commented on by referees. Accepted papers will appear in the Proceedings of ISCISC’11 as well as the Conference CD, on the condition of being presented in the Conference.
All presented papers will be included in the conference proceedings and will be published through IEEE Xplore digital library.
Also, Selected papers from the conference will be considered for publication in ISeCure (The ISC International Journal of Information Security).
The IEEE standard must be observed by authors. The guidelines for paper formatting and a template are available on our website. The conference language is both Persian and English.