posted by user: thngoc || 3131 views || tracked by 12 users: [display]

ISC 2017 : 20th International Information Security Conference


Conference Series : Information Security Conference
When Nov 22, 2017 - Nov 24, 2017
Where Ho Chi Minh city, Vietnam
Submission Deadline Jul 7, 2017
Notification Due Aug 23, 2017
Final Version Due Sep 7, 2017

Call For Papers

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW'97, LNCS 1396), Malaysia (ISW'99, LNCS 1729), and Australia (ISW'00, LNCS 1975), and then changed to the current name ISC when it was held in Spain in 2001 (ISC'01, LNCS 2200). Later conferences were held in Brazil (ISC'02, LNCS 2433), UK (ISC'03, LNCS 2851), California, USA (ISC'04, LNCS 3225), Singapore (ISC'05, LNCS 3650), Greece (ISC'06, LNCS 4176), Chile (ISC'07, LNCS 4779), Taipei, Taiwan (ISC'08, LNCS 5222), Italy (ISC'09, LNCS 5735), Florida, USA (ISC'10, LNCS 6531), China (ISC'11, LNCS 7001), Germany (ISC'12, LNCS 7483), and Dallas, USA (ISC'13).Hong Kong (ISC'14), Norway (ISC'15), Hawaii, USA (ISC’16).

20th Information Security Conference (ISC'17) will be held in Ho Chi Minh city, Viet Nam. The conference seeks submissions from academia, industry, and government that present novel research on all theoretical and practical aspects of Information Security.

We are greatly honored to have two esteemed keynotes at ISC 2017, that is:
- Professor Adi Shamir is a co-author of RSA public key cryptosystem, from Weizmann Institute (Israel) and École Normale Supérieure University (France).
- Dr. Thai Duong is a security and cryptography expert at Google, USA.

Areas of interest include, but are not restricted to:

access control
anonymity and pseudonymity
applied cryptography
computer forensics
critical infrastructure security
cryptographic protocols
database security
data protection
data/system integrity
digital right management
economics of security and privacy
electronic frauds
embedded security
formal methods in security
identity management
information hiding & watermarking
intrusion detection
network security
peer-to-peer security
secure group communications
security in information flow
security for Internet of Things
security for mobile code
secure cloud computing
security in location services
security modeling & architectures
security and privacy in social networks
security and privacy in pervasive and ubiquitous computing
security of eCommerce, eBusiness and eGovernment
security models for ambient intelligence environments
trust models and trust policies
information dissemination control

* Instructions for Paper Submission:

As in all previous ISC editions, the proceedings will be published in the Springer Lecture Notes in Computer Science(LNCS) series. In this sense, all submissions are limited to 18 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length. The Springer llncs class file can be downloaded at

Each submission must be thoroughly anonymized, with no author names, affiliations, acknowledgements, or obvious references. Submissions must not duplicate work that was published elsewhere, or work that has been submitted in parallel to any other conference, journal or workshop that has proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference. One full registration is required for every accepted paper.

*Best paper award and best student paper:

All submissions are eligible for the competitions for best paper, if one of the authors will present the paper, and best student paper, if at least one full-time student is the primary author and the presenting author at the conference. We reserve the right not to give an award.

* Committees:

- Co-General Chairs
Martin Kappes, Vietnamese German University, Vietnam, and Frankfurt am Main University, Germany.
Dinh-Thuc Nguyen, University of Science, VNU-HCM, Vietnam.

- Program Chairs
Phong Nguyen, Inria (France) and CNRS/JFLI/University of Tokyo (Japan).
Jianying Zhou, I2R, Singapore (Currently), SUTD (Singapore University of Technology and Design) (To be).

- Steering Committee
Colin Boyd, Norwegian University of Science and Technology, Norway
Ed Dawson, Queensland University of Technology, Australia
Javier Lopez, University of Malaga, Spain
Masahiro Mambo, Kanazawa University, Japan
Eiji Okamoto, University of Tsukuba, Japan
Susanne Wetzel, Stevens Institute of Technology, USA
Rui Zhang, University of Delaware, USA
Yuliang Zheng, University of Alabama at Birmingham, USA

- Program Committee
Shweta Agrawal, Indian Institute of Technology Madras, India
Gail-Joon Ahn, Arizona State University, United States
Yoshinori Aono, National Institute of Information and Communications Technology, Japan
Jean-Philippe Aumasson, Kudelski Security, United States
Gildas Avoine, INSA Rennes, France
Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong
Carlos Cid, Royal Holloway, University of London, United Kingdom
Yuval Elovici, Ben-Gurion University, Israel
Debin Gao, Singapore Management University, Singapore
Juan A. Garay, Yahoo Labs, United States
Stefanos Gritzalis, University of the Aegean, Greece
Tibor Jager, Paderborn University, Germany
Sokratis Katsikas, Norwegian University of Science and Technology, Norway
Stefan Katzenbeisser, Security Engineering Group, TU Darmstadt, Germany
Noboru Kunihiro, University of Tokyo, Japan
Qi Li, Tsinghua University, China
Zhiqiang Lin, University of Texas at Dallas, United States
Javier Lopez, University of Malaga, Spain
Mark Manulis, University of Surrey, United Kingdom
Weizhi Meng, City University of Hong Kong, Hong Kong
Chris Mitchell, University of London, United Kingdom
David Naccache, École normale supérieure, France
Khoa Nguyen, Nanyang Technological University, Singapore
Martin Ochoa, Singapore University of Technology and Design, Singapore
Tatsuaki Okamoto, Nippon Telegraph and Telephone Corporation, Japan
Yanbin Pan, Chinese Academy of Sciences, China
Duong-Hieu Phan, University of Limoges, France
Indrakshi Ray, Colorado State University, United States
Matt Robshaw, Impinj Inc., United States
Pierangela Samarati, University of Milan, Italy
Gang Tan, Penn State University, United States
Lei Wang, Shanghai Jiao Tong University, China

- Local organization board
Michael Braun, Vietnamese German University, Vietnam
Chi-Viet Ho, Vietnamese German University, Vietnam
Jae-Young Hur, Vietnamese German University, Vietnam
Quoc-Hung Nguyen, Vietnamese German University, Vietnam
Thuy-Trang Nguyen, Vietnamese German University, Vietnam
Thuan-Anh Tran, Vietnamese German University, Vietnam
Thu-Huong Tran, Vietnamese German University, Vietnam
Hong-Ngoc Tran (local chair), Vietnamese German University, Vietnam


Related Resources

OpenSuCo @ ISC HPC 2017   2017 International Workshop on Open Source Supercomputing
eCrime 2018   13th Symposium on Electronic Crime Research
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
MWAIS 2018   13th Annual Conference of the Midwest Association for Information Systems
WEIS 2018   Workshop on the Economics of Information Security
IH&MMSec 2018   ACM Workshop on Information Hiding and Multimedia Security
ISC HPC 2017   ISC High Performance 2017
ISC HPC 2018   ISC High Performance 2018
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
ICITA 2018   International Conference on Information Technology and Applications