posted by user: nardyen || 3617 views || tracked by 5 users: [display]

ICISC 2015 : The 18th Annual International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information Security and Cryptology
 
Link: http://www.icisc.org/icisc15/asp/cfp.html
 
When Nov 25, 2015 - Nov 27, 2015
Where Seoul, Korea
Submission Deadline Aug 31, 2015
Notification Due Oct 19, 2015
Final Version Due Nov 2, 2015
Categories    security   cryptography   cryptology
 

Call For Papers

OVERVIEW

Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2015, the 18th Annual International Conference on Information Security and Cryptology which is sponsored by KIISC (Korean Institute of Information Security and Cryptology), Korea.


TOPICS of INTEREST INCLUDE, but are not limited to:

● Access Control & Audit
● Authentication and Authorization
● Biometrics
● Block and Stream Ciphers
● Cloud Computing Security
● Copyright Protection
● Cryptanalysis
● Cryptographic Protocol
● Digital Forensics
● Digital Signature
● Distributed Systems Security
● Efficient Implementation
● Electronic Commerce
● Hash Function
● Homomorphic Encryption
● Identity Management
● ID-based Cryptography
● Information Hiding
● Intrusion Detection and Prevention
● Key Management
● Mobile Security
● Privacy Enhancement
● Public Key Cryptography
● Secure Multiparty Computation
● Security Management
● Security Policy
● Side Channel Attacks and Countermeasures
● Smart Device Security
● Social Network Security
● Software Security



INSTRUCTIONS for AUTHORS

Submissions must not substantially duplicate work that any of the authors have published elsewhere or submitted in parallel to any other conference or workshop that has proceedings. The paper should start with a title, an abstract and keywords, but must be anonymous. The length of the submission should not exceed 12 pages excluding the bibliography and clearly marked appendices, using at least 10 point fonts and reasonable margins. Since committee members are not required to read the appendices, the paper should be intelligible without them. All papers must be in Portable Document Format (PDF). It is strongly recommended that submissions be processed using LaTeX2e according to the instruction at http://www.springer.de/comp/lncs/ authors.html. Authors of accepted papers must guarantee that their paper will be presented at the conference.
ELECTRONIC SUBMISSION: https://secure.iacr.org/websubrev/icisc2015/submit/

Related Resources

SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
IEEE--ICCT--Ei and Scopus 2019   2019 19th IEEE International Conference on Communication Technology (ICCT 2019)--Ei Compendex and Scopus
ICCNS--Ei Compendex and Scopus 2019   2019 9th International Conference on Communication and Network Security (ICCNS 2019)--Ei Compendex and Scopus
ACNS 2019   International Conference on Applied Cryptography and Network Security
ICCNS--Ei and Scopus 2019   2019 9th International Conference on Communication and Network Security (ICCNS 2019)--Ei Compendex and Scopus
CRIS 2019   International Conference on Cryptography and Information Security
ICCNT--SCOPUS 2019   2019 3rd International Conference on Communication and Network Technology (ICCNT 2019)--JCM, SCOPUS