Conference Information
ISC 2025: Information Security Conference
https://isc25.skku.edu/Submission Date: |
2025-06-04 |
Notification Date: |
2025-07-29 |
Conference Date: |
2025-10-20 |
Location: |
Seoul, South Korea |
Years: |
28 |
CCF: c CORE: b QUALIS: a2 Viewed: 50281 Tracked: 106 Attend: 13
Call For Papers
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications. Types of Submissions Solicited Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to: access control formal methods post-quantum cryptography anonymity foundations privacy applied cryptography functional encryption privacy-enhancing technologies attribute-based cryptography hardness assumptions protocols automated security analysis homomorphic encryption public-key cryptography biometric security identity-based cryptography real-world cryptography blockchain identity management secure messaging certification implementations secure voting cloud computing indistinguishability obfuscation security proofs containerization Internet security side-channel attacks critical infrastructures intrusion detection software security cryptanalysis key management standardization cryptocurrency malware symmetric-key cryptography cybercrime mathematical aspects threshold cryptography database/system security micro-architectural attacks trusted execution decentralized systems mobile/wireless/5G security unlinkability downgrade attacks multilinear maps usability embedded platforms multi-party computation vulnerabilities fault attacks networks security web security fingerprinting OS and systems security zero-knowledge proofs
Last updated by Dou Sun in 2025-05-26
Acceptance Ratio
| Year | Submitted | Accepted | Accepted(%) |
|---|---|---|---|
| 2014 | 106 | 36 | 34% |
| 2013 | 70 | 30 | 42.9% |
| 2012 | 72 | 23 | 31.9% |
| 2011 | 95 | 25 | 26.3% |
| 2010 | 117 | 36 | 30.8% |
| 2009 | 105 | 38 | 36.2% |
| 2008 | 134 | 33 | 24.6% |
| 2007 | 116 | 28 | 24.1% |
| 2006 | 188 | 38 | 20.2% |
| 2005 | 271 | 38 | 14% |
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| c | b | b1 | ICICS | International Conference on Information and Communications Security | 2025-05-23 | 2025-07-21 | 2025-10-29 |
| c | b1 | FUSION | International Conference on Information Fusion | 2024-03-01 | 2024-05-01 | 2024-07-07 | |
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| c | INSCRYPT | International Conference on Information Security and Cryptology | 2025-06-15 | 2025-08-01 | 2025-10-19 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 | ||
| b | ITW | Information Theory Workshop | 2013-07-12 | 2013-09-09 | |||
| b | b1 | ISIT | International Symposium on Information Theory | 2019-01-20 | 2019-03-31 | 2019-07-07 | |
| c | ISA' | International Conference on Information Security and Assurance | 2016-01-30 | 2016-02-15 | 2016-03-24 | ||
| b | b3 | ICISS | International Conference on Information Systems Security | 2025-08-10 | 2025-10-03 | 2025-12-16 | |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| Short | Full Name | Conference |
|---|---|---|
| ICICS | International Conference on Information and Communications Security | 2025-10-29 |
| FUSION | International Conference on Information Fusion | 2024-07-07 |
| IAS | International Conference on Information Assurance and Security | 2015-12-07 |
| INSCRYPT | International Conference on Information Security and Cryptology | 2025-10-19 |
| ICISC | International Conference on Information Security and Cryptology | 2015-11-25 |
| ITW | Information Theory Workshop | 2013-09-09 |
| ISIT | International Symposium on Information Theory | 2019-07-07 |
| ISA' | International Conference on Information Security and Assurance | 2016-03-24 |
| ICISS | International Conference on Information Systems Security | 2025-12-16 |
| ISC | Information Security Conference | 2025-10-20 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| International Journal of Information Security | 2.400 | Springer | 1615-5262 | |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| c | EURASIP Journal on Information Security | 2.500 | Springer | 1687-417X |
| The Information Society | 3.000 | Taylor & Francis | 0197-2243 | |
| c | International Journal of Information and Computer Security | Inderscience | 1744-1765 | |
| a | IEEE Transactions on Information Forensics and Security | 6.300 | IEEE | 1556-6013 |
| Information Polity | 1.300 | IOS Press | 1570-1255 | |
| a | IEEE Transactions on Information Theory | 2.200 | IEEE | 0018-9448 |
| Journal of Information Science | 1.800 | SAGE | 0165-5515 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| IET Information Security | 1.300 | IET |
| International Journal of Information Security | 2.400 | Springer |
| International Journal of Information Security and Privacy | 0.800 | Idea Group Inc |
| EURASIP Journal on Information Security | 2.500 | Springer |
| The Information Society | 3.000 | Taylor & Francis |
| International Journal of Information and Computer Security | Inderscience | |
| IEEE Transactions on Information Forensics and Security | 6.300 | IEEE |
| Information Polity | 1.300 | IOS Press |
| IEEE Transactions on Information Theory | 2.200 | IEEE |
| Journal of Information Science | 1.800 | SAGE |