Conference Information
ISCISC 2019: International ISC Conference on Information Security and Cryptology
Please Login to view website of conference
Submission Date: |
2019-06-02 Extended |
Notification Date: |
2019-07-22 |
Conference Date: |
2019-08-28 |
Location: |
Mashhad, Iran |
Years: |
16 |
Viewed: 14095 Tracked: 0 Attend: 1
Call For Papers
For the past fifteen years, the International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) has been the flagship conference in information security and cryptology in Iran. The 16th ISCISC conference (ISCISC'2019) is organized by Ferdowsi University of Mashhad, Mashhad, Iran from August 28th to 29th, 2019 in co-operation with the Iranian Society of Cryptology.
The objective of ISCISC'2019 is to bring together researchers, engineers, and practitioners interested in various aspects of information security and cryptology. The conference aims to provide a forum for academicians, engineers, specialists, and students from all around the world to meet and discuss the latest developments in theory and practice in various areas of information security. ISCISC'2019 encourages researchers, developers and practitioners to submit their original papers and organize workshops on various new emerging topics. Keynote/plenary talks and panel discussions are another conference highlight.
Topics
Foundations of cryptology
Foundation of cryptology
Symmetric cryptographic algorithms
Asymmetric and cryptographic algorithms and digital signatures
Hash functions
New methods in cryptography (post-quantum cryptography, functional cryptography, homomorphic cryptography, …
Information theoretic security
Implementation of cryptographic algorithms and related attacks
Software and hardware implementation of cryptographic algorithms
Side channel attacks and countermeasures
Embedded cryptographic systems
Hardware tampering and countermeasures
Cryptographic hardware accelerators
Verification and fault detection of implementations
Network security
Wireless and mobile network security
Security of network infrastructures
Security of network protocols and layers
Intrusion detection and prevention systems
Security of critical infrastructures
Cryptography and security protocols
Authentication and identification protocols
Anonymity, privacy and trust management
Cryptanalysis of security protocols
Trust and security models
Formal methods in information security
Security of computation
Security in computer architecture
Operating system security
Database security
Analysis of security and vulnerability of software and application programs
Security and privacy in mobile devices
Security of cloud computing
Access control
Security of data, systems and applications
Social engineering in security
Information security management system (ISMS)
Information security training
E-business and e-service security
E-health security
E-banking security
E-learning security
Information hiding
New algorithms in steganography and watermarking
Attack modeling and watermarking
Steganalysis
Applications of Information hiding
Digital forensics
Digital forensics methods
Database and network forensics
Fraud detection
Tamper detection and prevention
Special topics of ISCISC2019 conference
Security Regulations for Industrial Control Systems
Cyber security master plan for critical infrastructures (Electricity, Water, Oil & Gas, Transportation)
Common threats and vulnerabilities of industrial control systems
Cost analysis on security of industrial control systems
Native products for securing industrial control systems
Security architecture of industrial control systems
Security of SCADA systems
Standards and best practices in various industries
Security for the Internet of Things (IoT)
The objective of ISCISC'2019 is to bring together researchers, engineers, and practitioners interested in various aspects of information security and cryptology. The conference aims to provide a forum for academicians, engineers, specialists, and students from all around the world to meet and discuss the latest developments in theory and practice in various areas of information security. ISCISC'2019 encourages researchers, developers and practitioners to submit their original papers and organize workshops on various new emerging topics. Keynote/plenary talks and panel discussions are another conference highlight.
Topics
Foundations of cryptology
Foundation of cryptology
Symmetric cryptographic algorithms
Asymmetric and cryptographic algorithms and digital signatures
Hash functions
New methods in cryptography (post-quantum cryptography, functional cryptography, homomorphic cryptography, …
Information theoretic security
Implementation of cryptographic algorithms and related attacks
Software and hardware implementation of cryptographic algorithms
Side channel attacks and countermeasures
Embedded cryptographic systems
Hardware tampering and countermeasures
Cryptographic hardware accelerators
Verification and fault detection of implementations
Network security
Wireless and mobile network security
Security of network infrastructures
Security of network protocols and layers
Intrusion detection and prevention systems
Security of critical infrastructures
Cryptography and security protocols
Authentication and identification protocols
Anonymity, privacy and trust management
Cryptanalysis of security protocols
Trust and security models
Formal methods in information security
Security of computation
Security in computer architecture
Operating system security
Database security
Analysis of security and vulnerability of software and application programs
Security and privacy in mobile devices
Security of cloud computing
Access control
Security of data, systems and applications
Social engineering in security
Information security management system (ISMS)
Information security training
E-business and e-service security
E-health security
E-banking security
E-learning security
Information hiding
New algorithms in steganography and watermarking
Attack modeling and watermarking
Steganalysis
Applications of Information hiding
Digital forensics
Digital forensics methods
Database and network forensics
Fraud detection
Tamper detection and prevention
Special topics of ISCISC2019 conference
Security Regulations for Industrial Control Systems
Cyber security master plan for critical infrastructures (Electricity, Water, Oil & Gas, Transportation)
Common threats and vulnerabilities of industrial control systems
Cost analysis on security of industrial control systems
Native products for securing industrial control systems
Security architecture of industrial control systems
Security of SCADA systems
Standards and best practices in various industries
Security for the Internet of Things (IoT)
Last updated by Dou Sun in 2019-05-09
Related Conferences
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| Information Technology & People | 5.6 | Emerald | 0959-3845 | |
| b | Information and Software Technology | 4.3 | Elsevier | 0950-5849 |
| Ethics and Information Technology | 4.0 | Springer | 1388-1957 | |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| c | Behaviour & Information Technology | 3.1 | Taylor & Francis | 0144-929X |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |