Información de la conferencia
ISC 2025: Information Security Conference
Por favor Iniciar para ver el sitio web del congreso

Día de Entrega:
2025-06-04
Fecha de Notificación:
2025-07-29
Fecha de Conferencia:
2025-10-20
Ubicación:
Seoul, South Korea
Años:
28
CCF: c   CORE: b   QUALIS: a2   Vistas: 66426   Seguidores: 106   Asistentes: 13

Solicitud de Artículos
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security.

This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.

Types of Submissions Solicited

Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:

access control
formal methods
post-quantum cryptography
anonymity
foundations
privacy
applied cryptography
functional encryption
privacy-enhancing technologies
attribute-based cryptography
hardness assumptions
protocols
automated security analysis
homomorphic encryption
public-key cryptography
biometric security
identity-based cryptography
real-world cryptography
blockchain
identity management
secure messaging
certification
implementations
secure voting
cloud computing
indistinguishability obfuscation
security proofs
containerization
Internet security
side-channel attacks
critical infrastructures
intrusion detection
software security
cryptanalysis
key management
standardization
cryptocurrency
malware
symmetric-key cryptography
cybercrime
mathematical aspects
threshold cryptography
database/system security
micro-architectural attacks
trusted execution
decentralized systems
mobile/wireless/5G security
unlinkability
downgrade attacks
multilinear maps
usability
embedded platforms
multi-party computation
vulnerabilities
fault attacks
networks security
web security
fingerprinting
OS and systems security
zero-knowledge proofs
Última Actualización Por Dou Sun en 2025-05-26
Coeficiente de Aceptación
AñoEnviadosAceptadosAceptados(%)
20141063634%
2013703042.9%
2012722331.9%
2011952526.3%
20101173630.8%
20091053836.2%
20081343324.6%
20071162824.1%
20061883820.2%
20052713814%
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
bb3ICISSInternational Conference on Information Systems Security2026-07-102026-09-102026-12-16
cINSCRYPTInternational Conference on Information Security and Cryptology2025-06-152025-08-012025-10-19
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20
cbb1ICICSInternational Conference on Information and Communications Security2025-05-232025-07-212025-10-29
cb1FUSIONInternational Conference on Information Fusion2024-03-012024-05-012024-07-07
bb1ISITInternational Symposium on Information Theory2019-01-202019-03-312019-07-07
cISA'International Conference on Information Security and Assurance2016-01-302016-02-152016-03-24
cIASInternational Conference on Information Assurance and Security 2015-10-212015-11-102015-12-07
bICISCInternational Conference on Information Security and Cryptology2015-09-072015-10-192015-11-25
bITWInformation Theory Workshop2013-07-122013-09-09
Revistas Relacionadas
CCFNombre CompletoFactor de ImpactoEditorISSN
aIEEE Transactions on Information Forensics and Security8.0IEEE1556-6013
cJournal of Information Security and Applications3.7Elsevier2214-2126
International Journal of Information Security3.2Springer1615-5262
The Information Society3.0Taylor & Francis0197-2243
aIEEE Transactions on Information Theory2.9IEEE0018-9448
cEURASIP Journal on Information Security2.1Springer1687-417X
Information Polity1.8IOS Press1570-1255
Journal of Information Science1.7SAGE0165-5515
cIET Information Security1.300IET1751-8709
cInternational Journal of Information Security and Privacy0.800Idea Group Inc1930-1650