Conference Information
ISC 2025: Information Security Conference
Please Login to view website of conference
Submission Date: |
2025-06-04 |
Notification Date: |
2025-07-29 |
Conference Date: |
2025-10-20 |
Location: |
Seoul, South Korea |
Years: |
28 |
CCF: c CORE: b QUALIS: a2 Viewed: 66419 Tracked: 106 Attend: 13
Call For Papers
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security.
This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.
Types of Submissions Solicited
Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:
access control
formal methods
post-quantum cryptography
anonymity
foundations
privacy
applied cryptography
functional encryption
privacy-enhancing technologies
attribute-based cryptography
hardness assumptions
protocols
automated security analysis
homomorphic encryption
public-key cryptography
biometric security
identity-based cryptography
real-world cryptography
blockchain
identity management
secure messaging
certification
implementations
secure voting
cloud computing
indistinguishability obfuscation
security proofs
containerization
Internet security
side-channel attacks
critical infrastructures
intrusion detection
software security
cryptanalysis
key management
standardization
cryptocurrency
malware
symmetric-key cryptography
cybercrime
mathematical aspects
threshold cryptography
database/system security
micro-architectural attacks
trusted execution
decentralized systems
mobile/wireless/5G security
unlinkability
downgrade attacks
multilinear maps
usability
embedded platforms
multi-party computation
vulnerabilities
fault attacks
networks security
web security
fingerprinting
OS and systems security
zero-knowledge proofs
This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.
Types of Submissions Solicited
Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:
access control
formal methods
post-quantum cryptography
anonymity
foundations
privacy
applied cryptography
functional encryption
privacy-enhancing technologies
attribute-based cryptography
hardness assumptions
protocols
automated security analysis
homomorphic encryption
public-key cryptography
biometric security
identity-based cryptography
real-world cryptography
blockchain
identity management
secure messaging
certification
implementations
secure voting
cloud computing
indistinguishability obfuscation
security proofs
containerization
Internet security
side-channel attacks
critical infrastructures
intrusion detection
software security
cryptanalysis
key management
standardization
cryptocurrency
malware
symmetric-key cryptography
cybercrime
mathematical aspects
threshold cryptography
database/system security
micro-architectural attacks
trusted execution
decentralized systems
mobile/wireless/5G security
unlinkability
downgrade attacks
multilinear maps
usability
embedded platforms
multi-party computation
vulnerabilities
fault attacks
networks security
web security
fingerprinting
OS and systems security
zero-knowledge proofs
Last updated by Dou Sun in 2025-05-26
Acceptance Ratio
| Year | Submitted | Accepted | Accepted(%) |
|---|---|---|---|
| 2014 | 106 | 36 | 34% |
| 2013 | 70 | 30 | 42.9% |
| 2012 | 72 | 23 | 31.9% |
| 2011 | 95 | 25 | 26.3% |
| 2010 | 117 | 36 | 30.8% |
| 2009 | 105 | 38 | 36.2% |
| 2008 | 134 | 33 | 24.6% |
| 2007 | 116 | 28 | 24.1% |
| 2006 | 188 | 38 | 20.2% |
| 2005 | 271 | 38 | 14% |
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2026-07-10 | 2026-09-10 | 2026-12-16 | |
| c | INSCRYPT | International Conference on Information Security and Cryptology | 2025-06-15 | 2025-08-01 | 2025-10-19 | ||
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | b | b1 | ICICS | International Conference on Information and Communications Security | 2025-05-23 | 2025-07-21 | 2025-10-29 |
| c | b1 | FUSION | International Conference on Information Fusion | 2024-03-01 | 2024-05-01 | 2024-07-07 | |
| b | b1 | ISIT | International Symposium on Information Theory | 2019-01-20 | 2019-03-31 | 2019-07-07 | |
| c | ISA' | International Conference on Information Security and Assurance | 2016-01-30 | 2016-02-15 | 2016-03-24 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 | ||
| b | ITW | Information Theory Workshop | 2013-07-12 | 2013-09-09 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| The Information Society | 3.0 | Taylor & Francis | 0197-2243 | |
| a | IEEE Transactions on Information Theory | 2.9 | IEEE | 0018-9448 |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Information Polity | 1.8 | IOS Press | 1570-1255 | |
| Journal of Information Science | 1.7 | SAGE | 0165-5515 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |