posted by organizer: vtsouvalas || 2224 views || tracked by 4 users: [display]

ISC 2024 : 27th Information Security Conference

FacebookTwitterLinkedInGoogle


Conference Series : Information Security Conference
 
Link: https://isc24.cs.gmu.edu/
 
When Oct 23, 2024 - Oct 25, 2024
Where Arlington, VA, USA
Submission Deadline Jun 13, 2024
Notification Due Jul 30, 2024
Final Version Due Aug 15, 2024
Categories    security   cryptography   privacy   information security
 

Call For Papers

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.


Types of Submissions Solicited
------------------------------------------
Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:

access control | formal methods | post-quantum cryptography
anonymity | foundations | privacy
applied cryptography | functional encryption | privacy-enhancing technologies
attribute-based cryptography | hardness assumptions | protocols
automated security analysis | homomorphic encryption | public-key cryptography
biometric security | identity-based cryptography | real-world cryptography
blockchain | identity management | secure messaging
certification | implementations | secure voting
cloud computing | indistinguishability obfuscation | security proofs
containerization | Internet security | side-channel attacks
critical infrastructures | intrusion detection | software security
cryptanalysis | key management | standardization
cryptocurrency | malware | symmetric-key cryptography
cybercrime | mathematical aspects | threshold cryptography
database/system security | micro-architectural attacks | trusted execution
decentralized systems | mobile/wireless/5G security | unlinkability
downgrade attacks | multilinear maps | usability
embedded platforms | multi-party computation | vulnerabilities
fault attacks | networks security | web security
fingerprinting | OS and systems security | zero-knowledge proofs


Deadlines
------------------------------------------
Submission Deadline: June 6, 2024, AoE
Rebuttal: July 16-19, 2024
Notification: July 30, 2024, AoE
Camera-Ready Deadline: August 15, 2024, AoE
Conference: October 23-25, 2024


Best Paper Award
------------------------------------------
Accepted papers will be judged and ranked by the Program Committee. The best papers will be considered for the Best Paper Award (thanks to the gracious support from Springer).


Instructions for Authors
------------------------------------------
Submissions must be original work and may not be under submission to another journal or conference with proceedings at the time of review. Submissions must be in the Springer Lecture Notes in Computer Science (LNCS) style, with the default margins and fonts, but with the addition of page numbers (e.g., by adding \pagestyle{plain}). They are limited to 16 pages excluding bibliography and appendices, and to 20 pages including bibliography and appendices. Optionally, any amount of clearly marked supplementary material may be supplied, following the main body of the paper, but reviewers are not required to read this supplementary material and submissions are expected to be intelligible and complete without it.

Authors should consult Springer’s authors’ guidelines and use their LaTeX proceedings template. Springer encourages authors to include their ORCIDs in their papers. Submitted papers must be in PDF format and submitted electronically via the ISC 2024 submission system (HotCRP). The submission must be anonymous with no author names, affiliations, or obvious references.

For papers that are accepted, the corresponding author must, acting on behalf of all of the authors of that paper, complete and sign a Consent-to-Publish form, through which the copyright for their paper is transferred to Springer. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made. Moreover, authors of accepted papers must guarantee that their paper will be presented at the conference.

Related Resources

SEAS 2025   14th International Conference on Software Engineering and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
SECRYPT 2025   22nd International Conference on Security and Cryptography
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)