posted by user: gblanc || 10572 views || tracked by 27 users: [display]

IWSEC 2010 : The 5th International Workshop on Security

FacebookTwitterLinkedInGoogle


Conference Series : International Workshop on Security
 
Link: http://www.iwsec.org/2010/
 
When Nov 22, 2010 - Nov 24, 2010
Where Kobe, Japan
Submission Deadline Apr 30, 2010
Notification Due Jul 9, 2010
Categories    security   information security   cryptography   network security
 

Call For Papers

IWSEC 2010
Call for Papers


The 5th International Workshop on Security
November 22-24, 2010
Kobe International Conference Center, Kobe, Japan


Web page: http://www.iwsec.org/2010/
Contact: iwsec2010@iwsec.org


Original papers on the research and development of various security topics are solicited for submission to IWSEC 2010.


IWSEC 2010 will select submissions from three tracks, and the review and selection processes of these tracks will be independent of each other. Track III (security in real life applications) is a new track designed to allow researchers and practitioners to share their research and experience. We welcome papers that highlight the practical aspects of security technologies and industrial case studies.


Important Dates
Submission Deadline April 30, 2010
Notification July 9, 2010
IWSEC 2010 Workshop November 22-24, 2010


Topics of interest for the conference include but are not limited to:

* Track I: Foundations of Security
(Track Chair: Noboru Kunihiro, The University of Tokyo, Japan)
o Authentication
o Biometrics
o Block/Stream Ciphers
o Cryptographic Protocols
o Cryptanalysis
o Digital Signatures
o Hash Functions
o Information Hiding
o Public Key Cryptosystems
o Quantum Security

* Track II: Security in Networks and Ubiquitous Computing Systems
(Track Chair: Isao Echizen, National Institute of Informatics, Japan)
o Network Security
+ Intrusion Detection
+ Malware Detection
+ Security in Sensor Networks
o Security of Ubiquitous and Cloud Computing
+ Security of Multi-party Computing
+ Authorization and Access Control
+ Mobile Security
o Privacy Enhancing Technology
+ Anonymity-related Technology
+ Privacy Preserving System
+ Privacy on WEB and DB
o Software Security
+ Security Architectures
+ Data and System Integrity
+ Reliable Secure Interactions of Services

* Track III: Security in Real Life Applications
(Track Chair: Ryoichi Sasaki, Tokyo Denki University, Japan)
o Secure Living and Working Environments
+ Secure Consumer Electronics
+ RFID Security
o Security in Commerce and Government
+ DRM
+ Copyright Protection
+ Content Security E-business/e-commerce/e-government Security
o Security Management
+ Access Control Policies and ISMS
+ Business Processes Security
o Protection of Critical Infrastructures
+ Critical Infrastructure Protection
+ Risk Analysis and Risk Management
o Testing, Verification and Certification
+ Security Verification
+ Assurance
o Law, Policy, Ethics and Related Technologies
+ Digital Forensics
+ Information Law and Ethics


Instructions for Authors
Submitted papers must be original, unpublished, and not submitted to other conferences or journals for consideration for publication. Papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. They should be at most 16 pages long in total, in standard LNCS format except for author names and affiliations. Papers should be sufficiently intelligible and self-contained without appendices so that PC members can review papers without them. Accepted full papers will be presented at the workshop and will be published in the conference proceedings planned for publication in Springer‘s LNCS series. Papers accepted as short papers will also be presented at the workshop and will be published in the locally printed proceedings with an official ISBN number. At least one author of each accepted paper is required to register with the workshop and present the paper. Each paper can be submitted to one of the three tracks. The review and selection processes will be done according to the policy of the track. For instance, Track III emphasizes the practicability of the technology.


Best Paper Awards
Prizes will be awarded to the authors of the best paper(s) and the best student paper(s).

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
ECCWS 2024   23rd European Conference on Cyber Warfare and Security
CSW 2024   2024 3rd International Conference on Cyber Security
S&P 2025   The 45th IEEE Symposium on Security and Privacy
IEEE CSR 2024   2024 IEEE International Conference on Cyber Security and Resilience
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
IJPS 2024   International Journal of Pharmacological Sciences