posted by user: naoto_yanai || 1689 views || tracked by 9 users: [display]

IWSEC 2016 : The 11th International Workshop on Security

FacebookTwitterLinkedInGoogle


Conference Series : International Workshop on Security
 
Link: http://www.iwsec.org/2016/index.html
 
When Sep 12, 2016 - Sep 14, 2016
Where Tokyo
Submission Deadline Mar 31, 2016
Notification Due May 27, 2016
Final Version Due Jun 17, 2016
Categories    information security
 

Call For Papers

Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2016. Topics of interest for IWSEC 2016 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops. In particular, we encourage the following topics in this year:

Big Data Analysis for Security
Critical Infrastructure Security
Cryptanalysis
Cryptographic Protocols
Cybersecurity Economics
Digital Forensics
Enriched Cryptography
Formal Methods
IoT security
Machine Learning for Security
Malware Countermeasures
Measurements for Cybersecurity
Multiparty Computation
Post Quantum Cryptography
Privacy Preserving
Real World Cryptography
Visualization for Security


Committees
General co-chairs:
Masahiro Mambo (Kanazawa Univ., Japan)
Satoru Torii (Fujitsu Laboratories Ltd., Japan)

Program co-chairs:
Kazuto Ogawa (Japan Broadcasting Corporation, Japan)
Katsunari Yoshioka (Yokohama National Univ., Japan)


Proceedings:
Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science series.

Best Paper Awards:
Prizes will be awarded to the authors of the best paper(s) and the best student paper(s).


Keynote Talks:
We are planning to invite following world-leading researchers for keynote talks. Please wait for details to be announced:
Christopher Kruegel, UCSB, USA
Engin Kirda, Northeastern University, USA
Yosuke Todo, NTT, Japan


Instructions for Authors:
Submitted papers must be original, unpublished, and not submitted to other conferences or journals for consideration for publication. Papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. They should be at most 16 pages long in total (including bibliography and appendices), in the standard LNCS format (except for author names and affiliations). They should be submitted electronically in PDF format. A detailed description of the electronic submission procedure will be available at the workshop website. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. A part of papers may be accepted as short papers. At least one author of each accepted paper is required to register with the workshop until final version due, and is also required to present the paper in the conference. If no author registers or presents the paper, the paper will be rejected regardless of the reasons. Note that, if your paper is accepted, the title and the author list in your submission cannot be changed when preparing the final version without the approval of the program co-chairs.

Related Resources

ICIT - Ei 2017   2017 International Conference on Information Technology (ICIT 2017)--Ei Compendex, Scopus
IWSEC 2017   International Workshop on Security
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IJCSITY 2017   International Journal of Computational Science and Information Technology
eCrime 2018   13th Symposium on Electronic Crime Research
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
ICISSP 2018   4th International Conference on Information Systems Security and Privacy
IoTBDS 2018   3rd International Conference on Internet of Things, Big Data and Security
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
INCISCOS 2017   2nd International Conference on Information Systems and Computer Science