posted by system || 2087 views || tracked by 11 users: [display]

ISC 2009 : 12th Information Security Conference


Conference Series : Information Security Conference
When Sep 7, 2009 - Sep 9, 2009
Where Pisa, Italy
Submission Deadline Mar 31, 2009
Notification Due Jun 10, 2009
Final Version Due Jul 8, 2009
Categories    security

Call For Papers

12th Information Security Conference (ISC 2009)
Pisa, Italy -- September 7-9, 2009

ISC is an annual international conference covering research in and
applications of information security. The twelfth Information
Security Conference (ISC 2009) will be held in Pisa, Italy. The
conference seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of
information security. Topics of interest include, but are not limited

- access control
- accountability
- anonymity and pseudonymity
- applied cryptography
- authentication
- biometrics
- computer forensics
- cryptographic protocols
- database security
- data protection
- data/system integrity
- digital right management
- economics of security and privacy
- electronic frauds
- formal methods in security
- identity management
- information dissemination control
- information hiding and watermarking
- intrusion detection
- network security
- peer-to-peer security
- privacy
- security and privacy in pervasive/ubiquitous computing
- security in information flow
- security in IT outsourcing
- security for mobile code
- security of grid computing
- security of eCommerce, eBusiness and eGovernment
- security in location services
- security modeling and architectures
- security models for ambient intelligence environments
- security in social networks
- trust models and trust management policies

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers should be at most 15 pages
including the bibliography and well-marked appendices (using 11-point
font and reasonable margins on letter-size paper), and should be in
single-column format. Committee members are not required to read the
appendices, and so the paper should be intelligible without them. All
submissions should be appropriately anonymized (i.e., papers should
not contain author names or affiliations, or obvious
citations). Submissions are to be made to the submission web site at Only pdf files will be accepted.
Submissions not meeting these guidelines risk rejection without
consideration of their merits. Papers must be received by the
deadline of March 31, 2009. Authors of accepted papers must guarantee
that their papers will be presented at the conference. Accepted papers
will be published by Springer in the Lecture Notes in Computer Science
series. The camera-ready version of the accepted papers must follow
Springer guidelines (a Latex source file will be required).

Fabio Martinelli
CNR, Italy

Pierangela Samarati
University of Milan, Italy

Moti Yung
Google Inc., USA

Paper Submission due: March 31, 2009
Notification to authors: June 10, 2009
Camera ready due: July 8, 2009


This call for papers and additional information about the conference
can be found at

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ISC HPC 2018   ISC High Performance 2018
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
SECITC 2018   11th International Conference on Security for Information Technology and Communications
C2SI 2019   3rd International Conference on Codes, Cryptology and Information Security
IJAB 2018   International Journal of Advances in Biology
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
NECO 2018   7th International Conference of Networks and Communications
ISC 2018   21st Information Security Conference
IJGTT 2018   International Journal of Game Theory and Technology