logo

۰۲ آبان - ۰۴ آبان ۱۴۰۳

رتبه: C (CORE2023)Offline

Information Security Conference

به‌روزرسانی شده: 3 days ago
0.0 (0 امتیازات)

هنوز دنبال‌کننده‌ای وجود ندارد.

نمای کلی

The 27th Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security, aiming to attract high-quality papers in all technical aspects of information security. The conference will be held in-person in the greater Washington DC area and organized by George Mason University. Proceedings will be published by Springer as a separate LNCS volume.

فراخوان مقالات

Information Security Conference (ISC) 2024: Call for Papers

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high-quality papers in all technical aspects of information security. This includes submissions from academia, industry, and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.

ISC 2024 will be organized by George Mason University and held in-person in the greater Washington DC area.

Types of Submissions Solicited

Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:

  • access control
  • anonymity
  • applied cryptography
  • attribute-based cryptography
  • automated security analysis
  • biometric security
  • blockchain
  • certification
  • cloud computing
  • containerization
  • critical infrastructures
  • cryptanalysis
  • cryptocurrency
  • cybercrime
  • database/system security
  • decentralized systems
  • downgrade attacks
  • embedded platforms
  • fault attacks
  • fingerprinting
  • formal methods
  • foundations
  • functional encryption
  • hardness assumptions
  • homomorphic encryption
  • identity-based cryptography
  • identity management
  • implementations
  • indistinguishability obfuscation
  • intrusion detection
  • key management
  • malware
  • mathematical aspects
  • micro-architectural attacks
  • mobile/wireless/5G security
  • multilinear maps
  • multi-party computation
  • networks security
  • OS and systems security
  • post-quantum cryptography
  • privacy
  • privacy-enhancing technologies
  • protocols
  • public-key cryptography
  • real-world cryptography
  • secure messaging
  • secure voting
  • security proofs
  • side-channel attacks
  • software security
  • standardization
  • symmetric-key cryptography
  • threshold cryptography
  • trusted execution
  • unlinkability
  • usability
  • vulnerabilities
  • web security
  • zero-knowledge proofs

Deadlines

  • Submission Deadline: June 13, 2024 (Extended)
  • Rebuttal: July 16-19, 2024
  • Notification: July 30, 2024
  • Camera-Ready Deadline: August 15, 2024
  • Conference: October 23-25, 2024

Best Paper Award

Accepted papers will be judged and ranked by the Program Committee. The best papers will be considered for the Best Paper Award.

Instructions for Authors

  • Submissions must be original work and may not be under submission to another journal or conference with proceedings at the time of review.
  • Submissions must be in the Springer Lecture Notes in Computer Science (LNCS) style, with the default margins and fonts, but with the addition of page numbers (e.g., by adding \pagestyle{plain}).
  • They are limited to 16 pages excluding bibliography and appendices, and to 20 pages including bibliography and appendices.
  • Optionally, any amount of clearly marked supplementary material may be supplied, following the main body of the paper, but reviewers are not required to read this supplementary material and submissions are expected to be intelligible and complete without it.
  • Authors should consult Springer’s authors’ guidelines and use their LaTeX proceedings template.
  • Submitted papers must be in PDF format and submitted electronically via the ISC 2024 submission system (HotCRP).
  • The submission must be anonymous with no author names, affiliations, or obvious references.

For papers that are accepted, the corresponding author must complete and sign a Consent-to-Publish form, transferring the copyright to Springer. Authors of accepted papers must guarantee that their paper will be presented at the conference.

تاریخ‌های مهم

تاریخ‌های کنفرانس

Conference Date

۲ آبان ۱۴۰۳۴ آبان ۱۴۰۳

قبلاً:
  • ۲۳ تیر ۱۴۰۴ - ۲۵ تیر ۱۴۰۴

ارسال مقاله

Submission Deadline

۲۴ خرداد ۱۴۰۳

اعلان

Notification

۹ مرداد ۱۴۰۳

نسخه نهایی

Camera-Ready Deadline

۲۵ مرداد ۱۴۰۳

تاریخ‌های دیگر

Rebuttal

۲۶ تیر ۱۴۰۳۲۹ تیر ۱۴۰۳

رتبه منبع

منبع: CORE2023

رتبه: C

حوزه پژوهشی: Cybersecurity and privacy

نقشه

Loading feedback section...