| |||||||||||||
ISCISC 2024 : The 21st International ISC Conference on Information Security and Cryptology | |||||||||||||
Link: https://iscisc2024.modares.ac.ir/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
ISCISC is an annual international conference that explores the field of information and communication security research. It actively invites submissions from both academia and industry, highlighting groundbreaking studies across a wide spectrum of topics. These encompass the theoretical foundations and practical applications of cyber security. The topics of interest include, but are not limited to:
- Foundations of cryptology: --- Symmetric cryptographic algorithms --- Asymmetric and cryptographic algorithms and digital signatures --- Hash functions --- Information-theoretic security --- New methods in cryptography (functional cryptography, homomorphic cryptography, ...) - Implementation of cryptographic algorithms and related attacks: --- Software and hardware implementation of cryptographic algorithms --- Side channel attacks and countermeasures --- Embedded cryptographic systems --- Hardware tampering and countermeasures --- Cryptographic hardware accelerators --- Verification and fault detection of implementations - Network security --- Wireless and mobile network security --- Security of network infrastructures --- Security of network protocols and layers --- Intrusion detection and prevention systems --- Security of critical infrastructures - Cryptography and security models and protocols --- Authentication and identification protocols --- Anonymity, privacy, and trust management --- Cryptanalysis of security protocols --- Trust and security models --- Formal methods in information security --- Secure Multiparty Computation - Security of computation --- Security in computer architecture --- Operating system security --- Database security --- Analysis of security and vulnerability of software and application programs --- Malware Analysis --- Security and privacy in mobile devices and applications --- Access control - Security and privacy management --- Social engineering in security --- Information security management system (ISMS) --- Risk Management --- Information security training --- E-business and e-service security --- E-health security --- E-banking security --- E-learning security --- Privacy-Enhancing Technologies - Information hiding --- New algorithms in steganography and watermarking --- Steganalysis --- Applications of Information hiding - Digital forensics --- Digital forensics methods and tools --- Database and network forensics --- Mobile device forensics --- Fraud detection - Recent topics in cryptography and security --- Quantum cryptography --- Post-quantum cryptography --- Artificial Intelligence (AI) Security --- Blockchain technology and cryptocurrency --- Internet of Things (IoT), big data and cloud security --- Cyber-physical systems security --- Soft security The International ISC Conference on Information Security and Cryptology welcomes researchers, developers, and practitioners to submit their original papers and organize workshops on all aspects of cryptology and information security. For each accepted paper, at least one author must register for the conference and ensure that their paper is presented in-person. Non-local researchers have the opportunity to present their papers online. The accepted papers will be published in a special issue of the ISeCure journal (indexed in WoS-JCR, SCImago-SJR, and Scopus among other indexing services.) All manuscripts must be submitted in EDAS (https://edas.info/N31896). Submitted papers must not substantially overlap with papers that have already been published or accepted for publication, or that are simultaneously under review by a journal, conference, or workshop with published proceedings. Submissions must be a PDF file in ISeCure format (https://www.isecure-journal.com/journal/authors.note), no more than 8 pages long (up to 11 pages is acceptable with extra-page fee). Each paper submitted for evaluation to the conference is expected to obtain three quality reviews. |
|