posted by user: seamless || 15130 views || tracked by 16 users: [display]

WISA 2016 : The 17th World Conference on Information Security Applications


Conference Series : Workshop on Information Security Applications
When Aug 25, 2016 - Aug 27, 2016
Where Jeju Island, South Korea
Submission Deadline Jun 4, 2016
Notification Due Jul 3, 2016
Final Version Due Jul 17, 2016
Categories    information security   cryptography   software security   network security

Call For Papers

Call For Papers

WISA 2016
The 17th World Conference on Information Security Applications
August 25~27, 2016, Jeju Island, South Korea

Orgaizing Committee Chair : Howon Kim(Pusan National University, Korea)
Prgram Committee Co-Chairs: Dooho Choi (ETRI, Korea)

• Paper Submission deadline: June 6, 2016
• Acceptance notification: July 3, 2016
• Pre-proceedings version deadline: July 17, 2016
• WISA 2015 Conference: August 25-27, 2016
• LNCS Proceedings version deadline: September 19, 2016


The 17th World Conference on Information Security Applications (WISA 2016) will be held on Jeju Island, Korea on August 25-27, 2016. It is hosted by the Korea Institute of Information Security and Cryptology (KIISC) and sponsored by the Ministry of Science, ICT and Future Planning (MSIP). It is also co-sponsored by the Electronics & Telecommunications Research Institute (ETRI), the Korea Internet & Security Agency (KISA), and the National Security Research Institute (NSR). The primary focus of WISA 2016 is on systems and network security, and the secondary focus is on all other technical and practical aspects of security applications. The workshop will serve as a forum for new results from the academic research community as well as from the industry.

The areas of interest include, but are not limited to:
• Analysis of network and security protocols
• Applications of cryptographic techniques
• Automated tools for source code/binary analysis
• Critical infrastructure security
• Digital Forensics
• Exploit techniques and automation
• HCI security and privacy
• Malware analysis
• Network-based attacks
• Operating system security
• Security policy
• Storage and file system security
• Trustworthy computing
• Web security
• Anonymity and censorship-resistant technologies
• Authentication and authorization
• Botnet defense
• Denial-of-service attacks and countermeasures
• Embedded systems security
• Hardware and physical security
• Intrusion detection and prevention
• Mobile/wireless/cellular system security
• Network infrastructure security
• Practical cryptanalysis (hardware, DRM, etc.)
• Side channel attacks and countermeasures
• Techniques for developing secure systems
• Vulnerability research

Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to journals or any other conferences that have proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. The paper should be prepared according to the "Authors Instruction for LNCS"( and limited to at most 12 pages in total.

Related Resources

DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
AVC 2018   Advances in Vision Computing: An International Journal
SECITC 2018   11th International Conference on Security for Information Technology and Communications
ACM CCS 2018   25th ACM Conference on Computer and Communications Security (ACM CCS)
IAS 2018   The 14th International Conference on Information Assurance and Security
CiVEJ 2018   Civil Engineering and Urban Planning: An International Journal
ICNS--Ei and Scopus 2018   2018 The 3rd International Conference on Network Security (ICNS 2018)--Ei Compendex and Scopus
AITIJ 2018   Advances in Interconnect Technologies: An International Journal