posted by user: tell || 2817 views || tracked by 23 users: [display]

ISC 2016 : The 19th Information Security Conference


Conference Series : Information Security Conference
When Sep 7, 2016 - Sep 9, 2016
Where Honolulu, HI, USA
Submission Deadline Mar 7, 2016
Notification Due Apr 25, 2016
Final Version Due May 23, 2016
Categories    cryptography   security   information security

Call For Papers

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. ISC has been held in five continents. Papers on all technical aspects of these topics are solicited for submission. Areas of interest include, but are not restricted to:

access control
anonymity and pseudonymity
applied cryptography
computer forensics
critical infrastructure security
cryptographic protocols
database security
data protection
data/system integrity
digital right management
economics of security and privacy
electronic frauds
embedded security
formal methods in security
identity management
information hiding & watermarking
intrusion detection
network security
peer-to-peer security
secure group communications
security in information flow
security for Internet of Things
security for mobile code
secure cloud computing
security in location services
security modeling & architectures
security and privacy in social networks
security and privacy in pervasive and ubiquitous computing
security of eCommerce, eBusiness and eGovernment
security models for ambient intelligence environments
trust models and trust policies
economics of security and privacy
information dissemination control

* Important dates

Submission Deadline: March 7, 2016
Decision Notification: April 25, 2016
Proceedings Version: May 23, 2016
Conference: September 7-9, 2016

* Instructions for Paper Submission

As in all previous ISC editions, the proceedings will be published in the Springer Lecture Notes in Computer Science (LNCS) series. In this sense, all submissions are limited to 18 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length.

Each submission must be thoroughly anonymized, with no author names, affiliations, acknowledgements, or obvious references. Submissions must not duplicate work that was published elsewhere, or work that has been submitted in parallel to any other conference, journal or workshop that has proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference. One full registration is required for every accepted paper.

All submissions are eligible for the competitions for best paper, if one of the authors will present the paper and best student paper, if at least one full-time student is the primary author and the presenting author at the conference. We reserve the right not to give an award.

Related Resources

CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
ISC 2016   ISC High Performance 2016
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
ORAJ 2016   Operations Research and Applications: An International Journal
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
ISC HPC 2017   ISC High Performance 2017
IJISS 2016   International Journal of Information Security Science (IJISS)
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
ICITA 2017   International Conference on Information Technology and Applications