
۰۲ آبان - ۰۴ آبان ۱۴۰۳
Information Security Conference
هنوز دنبالکنندهای وجود ندارد.
نمای کلی
The 27th Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security, aiming to attract high-quality papers in all technical aspects of information security. The conference will be held in-person in the greater Washington DC area and organized by George Mason University. Proceedings will be published by Springer as a separate LNCS volume.
Information Security Conference (ISC) 2024: Call for Papers
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high-quality papers in all technical aspects of information security. This includes submissions from academia, industry, and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.
ISC 2024 will be organized by George Mason University and held in-person in the greater Washington DC area.
Types of Submissions Solicited
Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:
- access control
- anonymity
- applied cryptography
- attribute-based cryptography
- automated security analysis
- biometric security
- blockchain
- certification
- cloud computing
- containerization
- critical infrastructures
- cryptanalysis
- cryptocurrency
- cybercrime
- database/system security
- decentralized systems
- downgrade attacks
- embedded platforms
- fault attacks
- fingerprinting
- formal methods
- foundations
- functional encryption
- hardness assumptions
- homomorphic encryption
- identity-based cryptography
- identity management
- implementations
- indistinguishability obfuscation
- intrusion detection
- key management
- malware
- mathematical aspects
- micro-architectural attacks
- mobile/wireless/5G security
- multilinear maps
- multi-party computation
- networks security
- OS and systems security
- post-quantum cryptography
- privacy
- privacy-enhancing technologies
- protocols
- public-key cryptography
- real-world cryptography
- secure messaging
- secure voting
- security proofs
- side-channel attacks
- software security
- standardization
- symmetric-key cryptography
- threshold cryptography
- trusted execution
- unlinkability
- usability
- vulnerabilities
- web security
- zero-knowledge proofs
Deadlines
- Submission Deadline: June 13, 2024 (Extended)
- Rebuttal: July 16-19, 2024
- Notification: July 30, 2024
- Camera-Ready Deadline: August 15, 2024
- Conference: October 23-25, 2024
Best Paper Award
Accepted papers will be judged and ranked by the Program Committee. The best papers will be considered for the Best Paper Award.
Instructions for Authors
- Submissions must be original work and may not be under submission to another journal or conference with proceedings at the time of review.
- Submissions must be in the Springer Lecture Notes in Computer Science (LNCS) style, with the default margins and fonts, but with the addition of page numbers (e.g., by adding
\pagestyle{plain}
). - They are limited to 16 pages excluding bibliography and appendices, and to 20 pages including bibliography and appendices.
- Optionally, any amount of clearly marked supplementary material may be supplied, following the main body of the paper, but reviewers are not required to read this supplementary material and submissions are expected to be intelligible and complete without it.
- Authors should consult Springer’s authors’ guidelines and use their LaTeX proceedings template.
- Submitted papers must be in PDF format and submitted electronically via the ISC 2024 submission system (HotCRP).
- The submission must be anonymous with no author names, affiliations, or obvious references.
For papers that are accepted, the corresponding author must complete and sign a Consent-to-Publish form, transferring the copyright to Springer. Authors of accepted papers must guarantee that their paper will be presented at the conference.
تاریخهای مهم
تاریخهای کنفرانس
Conference Date
۲ آبان ۱۴۰۳ → ۴ آبان ۱۴۰۳
- ۲۳ تیر ۱۴۰۴ - ۲۵ تیر ۱۴۰۴
ارسال مقاله
Submission Deadline
۲۴ خرداد ۱۴۰۳
اعلان
Notification
۹ مرداد ۱۴۰۳
نسخه نهایی
Camera-Ready Deadline
۲۵ مرداد ۱۴۰۳
تاریخهای دیگر
Rebuttal
۲۶ تیر ۱۴۰۳ → ۲۹ تیر ۱۴۰۳
رتبه منبع
منبع: CORE2023
رتبه: C
حوزه پژوهشی: Cybersecurity and privacy