posted by user: ICISC2013 || 3761 views || tracked by 21 users: [display]

ICISC 2014 : The 17th Annual International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information Security and Cryptology
 
Link: http://www.icisc.org
 
When Dec 3, 2014 - Dec 5, 2014
Where Seoul, Korea
Submission Deadline Sep 4, 2014
Notification Due Oct 21, 2014
Final Version Due Nov 3, 2014
Categories    information security   cryptography
 

Call For Papers

The 17th Annual International Conference on Information Security and Cryptology
December 3 ~ 5, 2014, Seoul, Korea
http://www.icisc.org

Organizing Committee Chair : Young-Ho Park (Sejong Cyber University, Korea)
PC Co-Chairs : Jooyoung Lee (Sejong University, Korea), Jongsung Kim (Kookmin University, Korea)

- Important Dates

Submission deadline: September 4, 2014 18:00 KST (GMT + 9 hr)
Acceptance notification: October 21, 2014
Proceedings version deadline: November 3, 2014
ICISC 2014 conference: December 3 ~ 5, 2014

- OVERVIEW

Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2014, the 17th Annual International Conference on Information Security and Cryptology which is sponsored by KIISC (Korean Institute of Information Security and Cryptology), Korea

- Topics of Interest include, but are not limited to:

Access Control & Audit, Biometrics, Cloud Computing Security, Cryptanalysis, Digital Forensics, Distributed Systems Security, Electronic Commerce, Homomorphic Encryption, ID-based Cryptography, Intrusion Detection and Prevention, Mobile Security, Public Key Cryptography, Security Management, Side Channel Attacks and Countermeasures, Social Network Security, Authentication and Authorization, Block and Stream Ciphers, Copyright Protection, Cryptographic Protocol, Digital Signature, Efficient Implementation, Hash Function, Identity Management, Information Hiding, Key Management, Privacy Enhancement, Secure Multiparty Computation, Security Policy, Smart Device Security, Software Security

- INSTRUCTIONS for AUTHORS

Submissions must not substantially duplicate work that any of the authors have published elsewhere or submitted in parallel to any other conference or workshop that has proceedings. The paper should start with a title, an abstract and keywords, but must be anonymous. The length of the submission should not exceed 12 pages excluding the bibliography and clearly marked appendices, using at least 10 point fonts and reasonable margins. Since committee members are not required to read the appendices, the paper should be intelligible without them. All papers must be in Portable Document Format (PDF). It is strongly recommended that submissions be processed using LaTeX2e according to the instruction at http://www.springer.de/comp/lncs/authors.html. Authors of accepted papers must guarantee that their paper will be presented at the conference.

- ELECTRONIC SUBMISSION: TBA

- CONFERENCE PROCEEDINGS

The proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science.
Some distinguished papers will be recommended to a peer-reviewed international journal indexed by SCI(E) (pending).

Related Resources

eCrime 2018   13th Symposium on Electronic Crime Research
ICIT - Ei 2017   2017 International Conference on Information Technology (ICIT 2017)--Ei Compendex, Scopus
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
IJCIS 2017   International Journal on Cryptography and Information Security
IJCSITY 2017   International Journal of Computational Science and Information Technology
ICCSP - Ei & Scopus 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
IEEE - ICISE - Ei 2018   2018 3rd International Conference on Information Systems Engineering (ICISE 2018)--IEEE Xplore, Ei Compendex
ICITA 2018   International Conference on Information Technology and Applications