posted by user: seamless || 8361 views || tracked by 13 users: [display]

WISA 2015 : The 16th International Workshop on Information Security Applications

FacebookTwitterLinkedInGoogle


Conference Series : Workshop on Information Security Applications
 
Link: http://www.wisa.or.kr
 
When Aug 20, 2015 - Aug 22, 2015
Where Jeju Island, South Korea
Submission Deadline Jun 20, 2015
Notification Due Jul 25, 2015
Final Version Due Aug 1, 2015
Categories    information security   cryptography   privacy   security applications
 

Call For Papers

Call For Papers

WISA 2015
THe 16th International Workshop on Information Security Applications
August 20~22, 2015, Jeju Island, South Korea
http://www.wisa.or.kr


Orgaizing Committee Chair : Souhwan Jung (Soongsil University, Korea)
Prgram Committee Co-Chairs: Howon Kim (Pusan National University, Korea),Dooho Choi (ETRI, Korea)

IMPORTANT DATES
• Paper Submission deadline: June 20, 2015
• Acceptance notification: July 25, 2015
• Pre-proceedings version deadline: August 1, 2015
• WISA 2015 Conference: August 20-22, 2015
• LNCS Proceedings version deadline: September 19, 2015

OVERVIEW

The 16th International Workshop on Information Security Applications (WISA 2015) will be held on Jeju Island, Korea on August 20-22, 2015. It is hosted by the Korea Institute of Information Security and Cryptology (KIISC) and sponsored by the Ministry of Science, ICT and Future Planning (MSIP). It is also co-sponsored by the Electronics & Telecommunications Research Institute (ETRI), the Korea Internet & Security Agency (KISA), and the National Security Research Institute (NSRI). The primary focus of WISA 2015 is on systems and network security, and the secondary focus is on all other technical and practical aspects of security applications. The workshop will serve as a forum for new results from the academic research community as well as from the industry.

The areas of interest include, but are not limited to:
• Analysis of network and security protocols
• Applications of cryptographic techniques
• Automated tools for source code/binary analysis
• Critical infrastructure security
• Digital Forensics
• Exploit techniques and automation
• HCI security and privacy
• Malware analysis
• Network-based attacks
• Operating system security
• Security policy
• Storage and file system security
• Trustworthy computing
• Web security
• Anonymity and censorship-resistant technologies
• Authentication and authorization
• Botnet defense
• Denial-of-service attacks and countermeasures
• Embedded systems security
• Hardware and physical security
• Intrusion detection and prevention
• Mobile/wireless/cellular system security
• Network infrastructure security
• Practical cryptanalysis (hardware, DRM, etc.)
• Side channel attacks and countermeasures
• Techniques for developing secure systems
• Vulnerability research

INSTRUCTIONS FOR AUTHORS
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to journals or any other conferences that have proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. The paper should be prepared according to the "Authors Instruction for LNCS"(http://www.springer.de/comp/lncs/authors.html) and limited to at most 12 pages in total.

Related Resources

MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
JMC 2022   JOURNAL OF MATHEMATICAL CRYPTOLOGY
IJPLA 2022   International Journal of Programming Languages and Applications
CyberHunt 2022   IEEE BigData Workshop on Cyber Threat Intelligence and Hunting
CLBD 2022   3rd International Conference on Cloud and Big Data
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
CSP--Scopus, Ei 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)--Ei Compendex, Scopus
CSP 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)