posted by organizer: vtsouvalas || 523 views || tracked by 2 users: [display]

ISC 2024 : 27th Information Security Conference

FacebookTwitterLinkedInGoogle


Conference Series : Information Security Conference
 
Link: https://isc24.cs.gmu.edu/
 
When Oct 23, 2024 - Oct 25, 2024
Where Arlington, VA, USA
Submission Deadline Jun 6, 2024
Notification Due Jul 30, 2024
Final Version Due Aug 15, 2024
Categories    security   cryptography   privacy   information security
 

Call For Papers

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.


Types of Submissions Solicited
------------------------------------------
Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:

access control | formal methods | post-quantum cryptography
anonymity | foundations | privacy
applied cryptography | functional encryption | privacy-enhancing technologies
attribute-based cryptography | hardness assumptions | protocols
automated security analysis | homomorphic encryption | public-key cryptography
biometric security | identity-based cryptography | real-world cryptography
blockchain | identity management | secure messaging
certification | implementations | secure voting
cloud computing | indistinguishability obfuscation | security proofs
containerization | Internet security | side-channel attacks
critical infrastructures | intrusion detection | software security
cryptanalysis | key management | standardization
cryptocurrency | malware | symmetric-key cryptography
cybercrime | mathematical aspects | threshold cryptography
database/system security | micro-architectural attacks | trusted execution
decentralized systems | mobile/wireless/5G security | unlinkability
downgrade attacks | multilinear maps | usability
embedded platforms | multi-party computation | vulnerabilities
fault attacks | networks security | web security
fingerprinting | OS and systems security | zero-knowledge proofs


Deadlines
------------------------------------------
Submission Deadline: June 6, 2024, AoE
Rebuttal: July 16-19, 2024
Notification: July 30, 2024, AoE
Camera-Ready Deadline: August 15, 2024, AoE
Conference: October 23-25, 2024


Best Paper Award
------------------------------------------
Accepted papers will be judged and ranked by the Program Committee. The best papers will be considered for the Best Paper Award (thanks to the gracious support from Springer).


Instructions for Authors
------------------------------------------
Submissions must be original work and may not be under submission to another journal or conference with proceedings at the time of review. Submissions must be in the Springer Lecture Notes in Computer Science (LNCS) style, with the default margins and fonts, but with the addition of page numbers (e.g., by adding \pagestyle{plain}). They are limited to 16 pages excluding bibliography and appendices, and to 20 pages including bibliography and appendices. Optionally, any amount of clearly marked supplementary material may be supplied, following the main body of the paper, but reviewers are not required to read this supplementary material and submissions are expected to be intelligible and complete without it.

Authors should consult Springer’s authors’ guidelines and use their LaTeX proceedings template. Springer encourages authors to include their ORCIDs in their papers. Submitted papers must be in PDF format and submitted electronically via the ISC 2024 submission system (HotCRP). The submission must be anonymous with no author names, affiliations, or obvious references.

For papers that are accepted, the corresponding author must, acting on behalf of all of the authors of that paper, complete and sign a Consent-to-Publish form, through which the copyright for their paper is transferred to Springer. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made. Moreover, authors of accepted papers must guarantee that their paper will be presented at the conference.

Related Resources

InCIT 2024   The 8th International Conference on Information Technology
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
LAJC 2024   Latin-American Journal of Computing
CRYPIS 2024   13th International Conference on Cryptography and Information Security
ICISE 2024   ACM--2024 9th International Conference on Information Systems Engineering (ICISE 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSW 2024   2024 3rd International Conference on Cyber Security
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
JoL 2024   International Journal of Law
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex