ICISC: International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2025 or later

 
 

All CFPs on WikiCFP

Event When Where Deadline
ICISC 2024 The 27th Annual International Conference on Information Security and Cryptology
Nov 20, 2024 - Nov 22, 2024 Seoul Sep 6, 2024
ICISC 2022 25th Annual International Conference on Information Security and Cryptology
Nov 30, 2022 - Dec 2, 2022 Hotel Koreana, Seoul Sep 2, 2022
ICISC 2018 International Conference on Information Security and Cryptology
Nov 28, 2018 - Nov 30, 2018 Seoul, Korean Aug 29, 2018
ICISC 2016 The 19th Annual International Conference on Information Security and Cryptology
Nov 30, 2016 - Dec 2, 2016 Seoul, Korea Aug 26, 2016
ICISC 2015 The 18th Annual International Conference on Information Security and Cryptology
Nov 25, 2015 - Nov 27, 2015 Seoul, Korea Aug 31, 2015
ICISC 2014 The 17th Annual International Conference on Information Security and Cryptology
Dec 3, 2014 - Dec 5, 2014 Seoul, Korea Sep 4, 2014
ICISC 2013 The 16th Annual International Conference on Information Security and Cryptology
Nov 27, 2013 - Nov 29, 2013 Seoul, Korea Sep 9, 2013
ICISC 2012 International Conference on Information Security and Cryptology
Nov 28, 2012 - Nov 30, 2012 Seoul, Korea Aug 28, 2012
 
 

Present CFP : 2024

Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2024, the 27th Annual International Conference on Information Security and Cryptology which is sponsored by NSR(National Security Research Institute) and KIISC (Korean Institute of Information Security and Cryptology), Korea.

Cryptography Track
● Authentication and Authorization
● Biometrics
● Blockchain Security
● Block and Stream Ciphers
● Copyright Protection
● Cryptographic Protocols
● Cryptanalysis
● Digital Forensics
● Digital Signature
● Distributed Systems Security
● Efficient Cryptography Implementation
● Functional encryption
● Hash Function
● Homomorphic Encryption
● ID-based Cryptography
● Intrusion Detection and Prevention
● Information Hiding
● Key Management
● Post-quantum cryptography
● Privacy Enhancement
● Public Key Cryptography
● Side Channel Attacks and Countermeasures
● Secure Multiparty Computation
● Software Security
● Smart Device Security
● Zero-knowledge proofs

Security Track
● Analysis of network and security protocols
● Anonymity and censorship-resistant technologies
● Applications of cryptographic techniques
● Authentication and authorization
● Automated tools for source code/binary analysis
● Automobile security
● Botnet defense
● Critical infrastructure security
● Denial-of-service attacks and countermeasures
● Embedded systems security
● Exploit techniques and automation
● Hardware and physical security
● HCI security and privacy
● Malware analysis
● Mobile/wireless/cellular system security
● Network-based attacks
● Network infrastructure security
● Operating system security
● Practical cryptanalysis (hardware, DRM, etc.)
● Security policy
● Techniques for developing secure systems
● Trustworthy computing
● Trusted execution environments
● Unmanned System Security
● Vulnerability research
● Web Security
 

Related Resources

Ei/Scopus-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACIE 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ACIE--EI 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
ICCDE 2025   2026 12th International Conference on Computing and Data Engineering (ICCDE 2026)
CANS 2025   Cryptology and Network Security
IJFCST 2025   International Journal on Foundations of Computer Science & Technology
ICDMIS 2025   International Conference on Data Mining and Information Security