会议信息
ISC 2025: Information Security Conference
请登录查看会议网址
截稿日期: |
2025-06-04 |
通知日期: |
2025-07-29 |
会议日期: |
2025-10-20 |
会议地点: |
Seoul, South Korea |
届数: |
28 |
CCF: c CORE: b QUALIS: a2 浏览: 66423 关注: 106 参加: 13
征稿
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security.
This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.
Types of Submissions Solicited
Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:
access control
formal methods
post-quantum cryptography
anonymity
foundations
privacy
applied cryptography
functional encryption
privacy-enhancing technologies
attribute-based cryptography
hardness assumptions
protocols
automated security analysis
homomorphic encryption
public-key cryptography
biometric security
identity-based cryptography
real-world cryptography
blockchain
identity management
secure messaging
certification
implementations
secure voting
cloud computing
indistinguishability obfuscation
security proofs
containerization
Internet security
side-channel attacks
critical infrastructures
intrusion detection
software security
cryptanalysis
key management
standardization
cryptocurrency
malware
symmetric-key cryptography
cybercrime
mathematical aspects
threshold cryptography
database/system security
micro-architectural attacks
trusted execution
decentralized systems
mobile/wireless/5G security
unlinkability
downgrade attacks
multilinear maps
usability
embedded platforms
multi-party computation
vulnerabilities
fault attacks
networks security
web security
fingerprinting
OS and systems security
zero-knowledge proofs
This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.
Types of Submissions Solicited
Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:
access control
formal methods
post-quantum cryptography
anonymity
foundations
privacy
applied cryptography
functional encryption
privacy-enhancing technologies
attribute-based cryptography
hardness assumptions
protocols
automated security analysis
homomorphic encryption
public-key cryptography
biometric security
identity-based cryptography
real-world cryptography
blockchain
identity management
secure messaging
certification
implementations
secure voting
cloud computing
indistinguishability obfuscation
security proofs
containerization
Internet security
side-channel attacks
critical infrastructures
intrusion detection
software security
cryptanalysis
key management
standardization
cryptocurrency
malware
symmetric-key cryptography
cybercrime
mathematical aspects
threshold cryptography
database/system security
micro-architectural attacks
trusted execution
decentralized systems
mobile/wireless/5G security
unlinkability
downgrade attacks
multilinear maps
usability
embedded platforms
multi-party computation
vulnerabilities
fault attacks
networks security
web security
fingerprinting
OS and systems security
zero-knowledge proofs
最后更新 Dou Sun 在 2025-05-26
录取率
| 时间 | 提交数 | 录取数 | 录取率(%) |
|---|---|---|---|
| 2014 | 106 | 36 | 34% |
| 2013 | 70 | 30 | 42.9% |
| 2012 | 72 | 23 | 31.9% |
| 2011 | 95 | 25 | 26.3% |
| 2010 | 117 | 36 | 30.8% |
| 2009 | 105 | 38 | 36.2% |
| 2008 | 134 | 33 | 24.6% |
| 2007 | 116 | 28 | 24.1% |
| 2006 | 188 | 38 | 20.2% |
| 2005 | 271 | 38 | 14% |
相关会议
| CCF | CORE | QUALIS | 简称 | 全称 | 截稿日期 | 通知日期 | 会议日期 |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2026-07-10 | 2026-09-10 | 2026-12-16 | |
| c | INSCRYPT | International Conference on Information Security and Cryptology | 2025-06-15 | 2025-08-01 | 2025-10-19 | ||
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | b | b1 | ICICS | International Conference on Information and Communications Security | 2025-05-23 | 2025-07-21 | 2025-10-29 |
| c | b1 | FUSION | International Conference on Information Fusion | 2024-03-01 | 2024-05-01 | 2024-07-07 | |
| b | b1 | ISIT | International Symposium on Information Theory | 2019-01-20 | 2019-03-31 | 2019-07-07 | |
| c | ISA' | International Conference on Information Security and Assurance | 2016-01-30 | 2016-02-15 | 2016-03-24 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 | ||
| b | ITW | Information Theory Workshop | 2013-07-12 | 2013-09-09 |
相关期刊
| CCF | 全称 | 影响因子 | 出版商 | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| The Information Society | 3.0 | Taylor & Francis | 0197-2243 | |
| a | IEEE Transactions on Information Theory | 2.9 | IEEE | 0018-9448 |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Information Polity | 1.8 | IOS Press | 1570-1255 | |
| Journal of Information Science | 1.7 | SAGE | 0165-5515 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |