Conference Information
INSCRYPT 2018: International Conference on Information Security and Cryptology
Submission Date:
Notification Date:
Conference Date:
Fuzhou, China
Viewed: 13620   Tracked: 29   Attend: 3

Conference Location
Call For Papers
Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications for either crypto track or security track. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to:

Crypto Track

• Provable Security
• Sequences and Boolean Functions
• Secure Multiparty Computation
• Symmetric Key Cryptosystems
• Public Key Cryptosystems
• Implementation of Cryptosystems
• Hash Functions and MACs
• Block Cipher Modes of Operation
• Key Management and Key Recovery
• Security Protocols and Their Analysis
• Information Hiding and Watermarking
• Secure Computation Outsourcing
• Functional Computation and Verifiable Computation
• Obfuscation
• Leakage Resilient Cryptography

Security Track

• Authentication and Authorization
• Biometric security
• Distributed System Security
• Electronic Commerce Security
• Intrusion Detection
• Network Security
• Security Modeling and Architectures
• Intellectual Property Protection
• Mobile System Security
• Operating System Security
• Risk Evaluation and Security Certification
• Prevention and Detection of Malicious Codes
• Privacy Enhancing Technologies
• Genomic Privacy and SDN Security
• Big Data and Cloud Security

Instruction for Authors

Conference language is English. All submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be intelligible and self-contained within 20 pages including references and appendices and must be submitted electronically to easychair.

Submissions not meeting these guidelines risk rejection without consideration of their merits. It is highly advised to prepare the submissions in the Springer LNCS format.
Last updated by Dou Sun in 2018-06-03
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
CCVInternational Conference on Cloud Computing and Virtualization2011-12-09 2012-04-16
ICAMMCEInternational Conference on Advances in Materials, Mechatronics and Civil Engineerin2020-02-05 2020-03-20
cIFIPTMIFIP WG 11.11 International Conference on Trust Management2019-04-092019-05-122019-07-17
SecTechInternational Conference on Security Technology2015-10-102015-10-302015-11-25
ICCIS''International Conference on Computational Intelligence Systems2013-02-202013-02-282013-04-14
SSIAISouthwest Symposium on Image Analysis and Interpretation2019-12-012020-01-312020-03-28
STCAnnual IEEE Software Technology Conference2020-03-062020-04-032020-06-01
ECICTEuro-Asia Conference on Information and Communication Technology2020-11-092020-11-152020-12-09
MirageInternational Conference on Computer Vision / Computer Graphics Collaboration Techniques and Applications2013-03-012013-04-122013-06-06
SPASignal Processing - Algorithms, Architectures, Arrangements, and Applications2018-06-112018-07-092018-09-19