posted by user: yanai_naoto || 4050 views || tracked by 7 users: [display]

IWSEC 2015 : The 10th International Workshop on Security

FacebookTwitterLinkedInGoogle


Conference Series : International Workshop on Security
 
Link: http://www.iwsec.org/2015/
 
When Aug 26, 2015 - Aug 28, 2015
Where Nara, Japan
Submission Deadline Mar 31, 2015
Notification Due May 22, 2015
Final Version Due Jun 12, 2015
Categories    information security   cryptography   privacy preserving data mining
 

Call For Papers

Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2015. Topics of interest for IWSEC 2015 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops. In particular, we encourage the following topics in this year:

Critical Infrastructure Security
Cryptographic Protocols
Digital Forensics
Formal Methods
Privacy Preserving Data Mining
Real World Cryptography
Secure Multiparty Computation
Security Visualization
Software and System Security for Big Data


Committees:
General co-chairs:
Yukiyasu Tsunoo (NEC, Japan)
Satoru Torii (Fujitsu Laboratories Ltd., Japan)

Program co-chairs:
Keisuke Tanaka (Tokyo Institute of Technology, Japan)
Yuji Suga (Internet Initiative Japan Inc., Japan)


Best Paper Awards:
Prizes will be awarded to the authors of the best paper(s) and the best student paper(s).


Instructions for Authors:
Submitted papers must be original, unpublished, and not submitted to other conferences or journals for consideration for publication. Papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. They should be at most 16 pages long in total (including bibliography and appendices), in the standard LNCS format (except for author names and affiliations). Submissions to IWSEC 2015 should be submitted electronically in PDF format. A detailed
description of the electronic submission procedure will be available at the workshop website. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. A part of papers may be accepted as short papers. At least one author of each accepted paper is required to register with the workshop until final version due, and is also required to present the paper in the conference. Note that, if your paper is accepted, the title and the author list in your submission cannot be changed when preparing the camera-ready version without the approval of the program co-chairs.


Venue:
IWSEC 2015 will be held at Todaiji Cultural Center in Nara, Japan. Nara was the capital of Japan in the 8th century. UNESCO listed the historic monuments of ancient Nara as World Heritage in 1998, which encompasses five Buddhist temples, one Shinto shrine, one Palace and one primeval forest. In particular, famous tourist attractions such as Todaiji Temple, Kofukuji Temple and Kasuga Shrine are within walking distance from the venue which is located in the center of Nara National Park.


Social Event
IWSEC 2015 plans to have a social banquet and excursion. We will announce the details on the web page.

Related Resources

CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
IJCIS 2020   International Journal on Cryptography and Information Security
AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [First Round]
SPPR 2020   9th International Conference on Signal, Image Processing and Pattern Recognition
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
MathSJ 2020   Applied Mathematics and Sciences: An International Journal
CCNC 2021   IEEE Consumer Communications & Networking Conference
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
CyberHunt 2020   International Workshop on Big Data Analytics for Cyber Threat Hunting
MoWiN 2021   10th International Conference on Mobile & Wireless Networks