posted by system || 11959 views || tracked by 26 users: [display]

ICISC 2011 : The 14th Annual International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information Security and Cryptology
 
Link: http://www.icisc.org
 
When Nov 30, 2011 - Dec 2, 2011
Where Seoul, South Korea
Submission Deadline Aug 31, 2011
Notification Due Oct 21, 2011
Final Version Due Nov 1, 2011
Categories    cryptology   security   cryptography   information
 

Call For Papers

ICISC 2011
Call for papers

The 14th Annual International Conference on Information Security and Cryptology will be held in Seoul, Korea, November 30 ~ December 2, 2011

http://www.icisc.org/

Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2011, the 14th Annual International Conference on Information Security and Cryptology which is sponsored by KIISC (Korean Institute of Information Security and Cryptology), Korea

Important Dates
◈ Submission deadline : August 31, 2011 18:00 KST (GMT + 9 hr)
◈ Acceptance notification : October 21, 2011
◈ Proceedings version deadline : November 1, 2011
◈ ICISC 2011 Conference : November 30 ~ December 2, 2011

Topics of Interest include, but are not limited to:

◈ Access Control & Audit
◈ Authentication and Authorization
◈ Biometrics
◈ Block/Stream Ciphers
◈ Computer Forensics
◈ Copyright Protection
◈ Cryptographic Protocols
◈ Cryptanalysis
◈ Digital Signatures
◈ Distributed Systems Security
◈ Efficient Implementations
◈ Electronic Commerce
◈ Elliptic Curve Cryptosystems
◈ Hash Function
◈ Information Hiding
◈ Internet/Intranet Security
◈ Intrusion Detection
◈ Key/Identity Management
◈ Malicious Codes
◈ Mobile Communications Security
◈ Public Key Cryptosystems
◈ Public Key Infrastructure
◈ Secret Sharing
◈ Security Management
◈ Side Channel Cryptanalysis
◈ Smart Cards/Java Cards
◈ Zero Knowledge


Instructions for Authors

Submission should not substantially duplicate work that any of the authors have published elsewhere or submitted in parallel to any other conference or workshop that has proceedings. The paper must start with a title, an abstract and keywords, but should be anonymous. The length of the submission should not exceed 12 pages excluding the bibliography and clearly marked appendices, using at least 11 point fonts and reasonable margins. Since committee members are not required to read the appendices, the paper should be intelligible without them. All papers must be in PostScript (PS) or Portable Document Format (PDF). It is strongly recommended that submissions be processed using LaTeX2e according to the instruction at http://www.springer.de/comp/lncs/authors.html. Authors of accepted papers must guarantee that their paper will be presented at the conference.

Details on the electronic submission process will be available on ICISC 2011 web site, http://www.icisc.org/

Conference Proceedings
The proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science.

Program Committee Chair
Howon Kim
Pusan National Univ., Pusan, Korea
Tel: +82-51-510-1010
Fax: +82-51-517-2431
E-mail: howonkim@pusan.ac.kr

Related Resources

Botnets 2019   Information Journal, MDPI
ICSS 2019   5th International Conference on Software Security
INDOCRYPT 2019   The 20th International Conference on Cryptology in India
EI--JCICE 2020   2020 International Joint Conference on Information and Communication Engineering(JCICE 2020)
SP 2020   IEEE Symposium on Security and Privacy
SCAI 2019   8th International Conference On Soft Computing, Artificial Intelligence And Applications
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
CANS 2019   The 18th International Conference on Cryptology And Network Security
ICIIP 2019   【ACM ICPS EI SCOPUS】2019 4th International Conference on Intelligent Information Processing
ACITY 2019   9th International Conference on Advances in Computing and Information Technology