posted by user: jhyi00 || 1942 views || tracked by 4 users: [display]

WISA 2014 : The 15th International Workshop on Information Security Applications


Conference Series : Workshop on Information Security Applications
When Aug 25, 2014 - Aug 27, 2014
Where Jeju Island, Korea
Submission Deadline Jun 20, 2014
Notification Due Jul 25, 2014
Final Version Due Aug 1, 2014
Categories    informatio security   applied cryptography

Call For Papers

The 15th International Workshop on Information Security Applications (WISA 2014) will be held on Jeju Island, Korea on August 25-27, 2014. It is hosted by the Korea Institute of Information Security and Cryptology (KIISC) and sponsored by the Ministry of Science, ICT and Future Planning (MSIP). It is also co-sponsored by the Electronics & Telecommunications Research Institute (ETRI), the Korea Internet & Security Agency (KISA), and the National Security Research Institute (NSRI). The primary focus of WISA 2014 is on systems and network security, and the secondary focus is on all other technical and practical aspects of security applications. The workshop will serve as a forum for new results from the academic research community as well as from the industry.

The areas of interest include, but are not limited to:

• Analysis of network and security protocols
• Anonymity and censorship-resistant technologies
• Applications of cryptographic techniques
• Authentication and authorization
• Automated tools for source code/binary analysis
• Botnet defense
• Critical infrastructure security
• Denial-of-service attacks and countermeasures
• Digital Forensics
• Embedded systems security
• Exploit techniques and automation
• Hardware and physical security
• HCI security and privacy
• Intrusion detection and prevention
• Malware analysis
• Mobile/wireless/cellular system security
• Network-based attacks
• Network infrastructure security
• Operating system security
• Practical cryptanalysis (hardware, DRM, etc.)
• Security policy
• Storage and file system security
• Techniques for developing secure systems
• Trustworthy computing
• Vulnerability research
• Web security


Expanded versions of selected papers will be recommended to peer-reviewed international journals indexed in SCI or SCIE. For this, now we are discussing with the following journals (subject to change):

• International Journal of Distributed Sensor Networks (IJDSN) - Hindawi (SCIE): Confirmed!!
• Journal of Supercomputing (JoS) - Springer (SCI)
• Applied Mathematics & Information Sciences (AMIS) – Natural Science Publishing (SCIE)
• Journal of Applied Mathematics (JAM) - Hindawi (SCIE)


Authors are invited to submit their original papers to the following EDAS system for review:


Authors must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to journals or any other conferences that have proceedings. The EDAS system automatically checks the similarity using the paper similarity detection tool.

The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. The paper should be prepared according to the "Authors Instruction for LNCS" ( and limited to at most 12 pages in total.

Related Resources

ICITA 2017   International Conference on Information Technology and Applications
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
ACISP 2017   Australasian Conference on Information Security and Privacy
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
DICTAP 2017   The Seventh International Conference on Digital Information and Communication Technology and Applications
WISA 2016   The 17th World Conference on Information Security Applications
WACV 2017   IEEE Winter Conference on Applications of Computer Vision
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference
IJISS 2016   International Journal of Information Security Science (IJISS)
ICSIPA 2017   IEEE International Conference on Signal and Image Processing Applications