ISC: Information Security Conference

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2027 or later

 
 

All CFPs on WikiCFP

Event When Where Deadline
ISC 2026 The 29th Information Security Conference (ISC)
Oct 28, 2026 - Oct 30, 2026 Rennes, France Jun 22, 2026
ISC 2025 Information Security Conference
Oct 20, 2025 - Oct 22, 2025 Sungkyunkwan University, Seoul, S.Korea Jun 11, 2025
ISC 2024 27th Information Security Conference
Oct 23, 2024 - Oct 25, 2024 Arlington, VA, USA Jun 13, 2024
ISC 2019 22nd Information Security Conference
Sep 16, 2019 - Sep 18, 2019 New York Apr 5, 2019
ISC 2018 21st Information Security Conference
Sep 9, 2018 - Sep 12, 2018 London (Guildford) Apr 16, 2018
ISC 2017 20th International Information Security Conference
Nov 22, 2017 - Nov 24, 2017 Ho Chi Minh city, Vietnam Jul 7, 2017
ISC 2016 The 19th Information Security Conference
Sep 7, 2016 - Sep 9, 2016 Honolulu, HI, USA Mar 7, 2016
ISC 2015 The Eighteenth Information Security Conference (ISC 2015)
Sep 9, 2015 - Sep 11, 2015 Trondheim, Norway May 4, 2015
ISC 2014 17th Information Security Conference
Oct 12, 2014 - Oct 14, 2014 Hong Kong Jun 25, 2014
ISC 2012 The 15th Information Security Conference
Sep 19, 2012 - Sep 21, 2012 Passau, Germany May 7, 2012
ISC 2011 14th Information Security Conference
Oct 26, 2011 - Oct 29, 2011 Xi’an, China May 22, 2011
ISC 2010 Information Security Conference
Oct 25, 2010 - Oct 28, 2010 Boca Raton Jun 29, 2010
ISC 2009 12th Information Security Conference
Sep 7, 2009 - Sep 9, 2009 Pisa, Italy Mar 31, 2009
ISC 2008 The 11th Information Security Conference
Sep 15, 2008 - Sep 18, 2008 Taipei, Taiwan Mar 1, 2008
 
 

Present CFP : 2026

**********************************************************************
29th Information Security Conference (ISC 2026)
Rennes, France -- 26-29 October, 2026
https://isc2026.github.io/
**********************************************************************

Important Dates
----------------

Submission Deadline: June 22 (11.59pm AoE)
Notification: August 31
Camera-Ready Deadline: September 14
Conference: October 28-30, FR

Overview
---------

The Information Security Conference (ISC) is an annual international
conference covering research in theory and applications of Information
Security. ISC aims to attract high quality papers in all technical
aspects of information security. It was first initiated as a workshop
in Tatsunokuchi, Ishikawa, Japan in 1997, and then continued in Kuala
Lumpur, Malaysia, and Wollongong, Australia. It then changed to the
current conference format when it was held in Malaga, Spain in 2001.
Further information about past ISC events is available through DBLP,
at https://dblp.uni-trier.de/db/conf/isw/


We are looking for papers with high-quality, original, and unpublished
research contributions. This includes submissions from academia,
industry and government on traditional as well as emerging topics and
new paradigms in these areas, with a clear connection to real-world
problems, systems, or applications.


Organizing Team
----------------

General Chair
Guillaume Hiet (CentraleSupélec/Inria)

Program Chairs
Joaquin Garcia-Alfaro (Institut Polytechnique de Paris)
Mehdi Tibouchi (NTT)

Steering Committee
Hyungjoon Koo (Sungkyunkwan University)
Zhiqiang Lin (The Ohio State University)
Javier Lopez (University of Malaga)
Masahiro Mambo (Kanazawa University)
Eiji Okamoto (University of Tsukuba)
Michalis Polychronakis (Stony Brook University)
Willy Susilo (University of Wollongong)
Jianying Zhou (Singapore University of Technology and Design)

Publications Chair
Rubén Salvador, CentraleSupélec, France

Publicity Chairs
Kaitai Liang (UTU / TU Delft)
Wenjuan Li (Education University of Hong Kong)
Paria Shirani (University of Ottawa)

Web Chair
Thomas Rokicki (CentraleSupélec)

Local Organization
Lydie Mabil (Inria)

Program Committee
Soon available at https://isc2026.github.io/committee/


Types of Submissions Solicited
------------------------------------------
Papers on all technical aspects of information security, cryptography,
and privacy are solicited for submission. Areas of interest include,
but are not limited to:


- access control - formal methods - post-quantum cryptography
- anonymity - foundations of cybersecurity - privacy
- applied cryptography - functional encryption - PETs
- attribute-based cryptography - hardness assumptions - protocols
- automated security analysis - homomorphic encryption - public-key cryptography
- biometric security - identity-based cryptography - real-world cryptography
- blockchain - identity management - secure messaging
- certification - implementations - secure voting
- cloud computing - indistinguishability - security proofs
- containerization - Internet security - side-channel attacks
- critical infrastructures - intrusion detection - software security
- cryptanalysis - key management - standardization
- cryptocurrency - malware - symmetric-key cryptography
- cybercrime - mathematical aspects - threshold cryptography
- database/system security - micro-architectural attacks - trusted execution
- decentralized systems - mobile/wireless/5G security - unlinkability
- downgrade attacks - multilinear maps - usability
- embedded platforms - multi-party computation - vulnerabilities
- fault attacks - networks security - web security
- fingerprinting - OS and systems security - zero-knowledge proofs


Best Paper Awards
--------------------------
Accepted papers will be judged and ranked by the Program Committee.
The best papers will be considered for Best Paper Awards (thanks to
the gracious support from our sponsors).


Instructions for Authors
-------------------------------

Submissions must be original work and may not be under submission to
another journal or conference with proceedings at the time of review.
Submissions must be in the Springer Lecture Notes in Computer Science
(LNCS) style, with the default margins and fonts, but with the
addition of page numbers (e.g., by adding \pagestyle{plain}). They are
limited to 16 pages excluding bibliography and appendices, and to 20
pages including bibliography and appendices. Optionally, any amount of
clearly marked supplementary material may be supplied, following the
main body of the paper, but reviewers are not required to read this
supplementary material and submissions are expected to be intelligible
and complete without it.


Make sure to use the official templates from:

https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines

Authors should consult Springer’s authors’ guidelines and use their
LaTeX proceedings template. Springer encourages authors to include
their ORCIDs in their papers. Submitted papers must be in PDF format
and submitted electronically via the ISC 2026 submission system
(https://easychair.org/conferences/?conf=isc2026). The submission must
be anonymous with no author names, affiliations, or obvious
references.


For papers that are accepted, the corresponding author must, acting on
behalf of all of the authors of that paper, complete and sign a
Consent-to-Publish form, through which the copyright for their paper
is transferred to Springer. The corresponding author signing the
copyright form should match the corresponding author marked on the
paper. Once the files have been sent to Springer, changes relating to
the authorship of the papers cannot be made. Moreover, authors of
accepted papers must guarantee that their paper will be presented at
the conference.


Before you Submit your Paper
-----------------------------------------

Authors are strongly advised to pay careful attention to the following
points:

- double-blind review process (anonymous submission without obvious references);
- in-person only conference (authors of accepted papers must guarantee attendance);
- any paper that is not presented (no-show) will be excluded from the proceedings;
- use the correct LNCS template and do not modify the original margins;
- strictly respect the page limits.

In case of doubts or questions, please contact the PC chairs at isc2026@easychair.org

Use of generative AI and LLMs
------------------------------------------

Authors must carefully minimize the use of AI and LLM tools and verify
that all content and results are accurate and supported by evidence.
Papers containing hallucinated citations, or any other invented or
fabricated claims will be desk rejected. Authors retain full
responsibility for the accuracy, originality, and integrity of the
work. In case of doubts or questions, please contact the PC chairs at
isc2026@easychair.org


For further details, please visit:

https://isc2026.github.io/call-for-papers/

or contact us at isc2026@easychair.org
 

Related Resources

ICITA 2026   ICITA 2026: 20th International Conference on Information Technology and Applications
ISC 2026   ISC High Performance 2026
Cyber-AI 2026   The 2nd IEEE 2026 International Conference on Cybersecurity and AI-Based Systems (Scopus)
IJCIS 2026   International Journal on Cryptography and Information Security
MLDS 2026   2026 International Conference on Machine Learning and Data Security-EI/Scopus
IJNSA 2026   International Journal of Network Security & Its Applications - ERA Indexed, H Index - 52
WIUHPC-ISC 2026   Seventh Workshop on Interactive and Urgent High-Performance Computing
SIPAIM 2026   22nd International Symposium on Medical Information Processing and Analysis
HICSS 2027   Hawaii International Conference on System Sciences
ICEEPS 2026   IEEE 2026 5th International Conference on Energy and Electrical Power Systems