Conference Information
ICISC 2015: International Conference on Information Security and Cryptology
http://www.icisc.org/icisc15/asp/index.htmlSubmission Date: |
2015-09-07 Extended |
Notification Date: |
2015-10-19 |
Conference Date: |
2015-11-25 |
Location: |
Seoul, Korea |
Years: |
18 |
CORE: b Viewed: 17187 Tracked: 27 Attend: 2
Call For Papers
OVERVIEW Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2015, the 18th Annual International Conference on Information Security and Cryptology which is sponsored by KIISC (Korean Institute of Information Security and Cryptology), Korea. TOPICS of INTEREST INCLUDE, but are not limited to: Access Control & Audit Authentication and Authorization Biometrics Block and Stream Ciphers Cloud Computing Security Copyright Protection Cryptanalysis Cryptographic Protocol Digital Forensics Digital Signature Distributed Systems Security Efficient Implementation Electronic Commerce Hash Function Homomorphic Encryption Identity Management ID-based Cryptography Information Hiding Intrusion Detection and Prevention Key Management Mobile Security Privacy Enhancement Public Key Cryptography Secure Multiparty Computation Security Management Security Policy Side Channel Attacks and Countermeasures Smart Device Security Social Network Security Software Security INSTRUCTIONS for AUTHORS Submissions must not substantially duplicate work that any of the authors have published elsewhere or submitted in parallel to any other conference or workshop that has proceedings. The paper should start with a title, an abstract and keywords, but must be anonymous. The length of the submission should not exceed 12 pages excluding the bibliography and clearly marked appendices, using at least 10 point fonts and reasonable margins. Since committee members are not required to read the appendices, the paper should be intelligible without them. All papers must be in Portable Document Format (PDF). It is strongly recommended that submissions be processed using LaTeX2e according to the instruction at http://www.springer.de/comp/lncs/ authors.html. Authors of accepted papers must guarantee that their paper will be presented at the conference. ELECTRONIC SUBMISSION: https://secure.iacr.org/websubrev/icisc2015/submit/
Last updated by Dou Sun in 2015-09-03
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
ICCATE | International Conference on Computers and Advanced Technology in Education | 2012-12-10 | 2013-01-14 |
CVC | Computer Vision Conference | 2018-11-01 | 2019-04-25 |
IFIPTM | IFIP WG 11.11 International Conference on Trust Management | 2019-04-09 | 2019-07-17 |
MulGraB | International Conference on Multimedia, Computer Graphics and Broadcasting | 2015-06-30 | 2015-11-25 |
S/P-IoT | International Workshop on Security and Privacy-preserving Solutions in the Internet of Things | 2022-08-31 | 2022-10-17 |
ICCIS' | International Conference on Computer and Information Science | 2019-01-01 | 2019-04-03 |
ICSAI | International Conference on Systems and Informatics | 2021-07-31 | 2021-11-13 |
BDC | IEEE/ACM International Symposium on Big Data Computing | 2015-07-03 | 2015-12-07 |
ISCAI | International Symposium on Computing and Artificial Intelligence | 2022-11-15 | 2022-12-16 |
ITIA | International Conference on Internet of Things and Intelligent Applications | 2020-08-15 | 2020-11-27 |
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
c | IET Information Security | 0.862 | IET | 1751-8709 |
c | International Journal of Information Security and Privacy | Idea Group Inc | 1930-1650 | |
Journal of King Saud University - Computer and Information Sciences | 8.839 | Elsevier | 1319-1578 | |
b | ACM Transactions of Information and System Security | ACM | 1094-9224 | |
c | EURASIP Journal on Information Security | Springer | 1687-417X | |
Information Security Technical Report | Elsevier | 1363-4127 | ||
c | Behaviour & Information Technology | 1.388 | Taylor & Francis | 0144-929X |
a | IEEE Transactions on Information Forensics and Security | 6.211 | IEEE | 1556-6013 |
b | Information and Software Technology | 2.730 | Elsevier | 0950-5849 |
The Information Society | 1.860 | Taylor & Francis | 0197-2243 |
Full Name | Impact Factor | Publisher |
---|---|---|
IET Information Security | 0.862 | IET |
International Journal of Information Security and Privacy | Idea Group Inc | |
Journal of King Saud University - Computer and Information Sciences | 8.839 | Elsevier |
ACM Transactions of Information and System Security | ACM | |
EURASIP Journal on Information Security | Springer | |
Information Security Technical Report | Elsevier | |
Behaviour & Information Technology | 1.388 | Taylor & Francis |
IEEE Transactions on Information Forensics and Security | 6.211 | IEEE |
Information and Software Technology | 2.730 | Elsevier |
The Information Society | 1.860 | Taylor & Francis |
Recommendation