IWSEC: International Workshop on Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2023 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
IWSEC 2022 The 17th International Workshop on Security
Aug 31, 2022 - Sep 2, 2022 Tokyo, Japan (Hybrid) Apr 6, 2022
IWSEC 2019 The 14th International Workshop on Security
Aug 28, 2019 - Aug 30, 2019 Tokyo, Japan Apr 2, 2019
IWSEC 2018 International Workshop on Security
Sep 3, 2018 - Sep 5, 2018 Sendai, Japan Apr 2, 2018
IWSEC 2017 International Workshop on Security
Aug 30, 2017 - Sep 1, 2017 Hiroshima, Japan Mar 14, 2017
IWSEC 2016 The 11th International Workshop on Security
Sep 12, 2016 - Sep 14, 2016 Tokyo Mar 31, 2016
IWSEC 2015 The 10th International Workshop on Security
Aug 26, 2015 - Aug 28, 2015 Nara, Japan Mar 31, 2015
IWSEC 2014 International Workshop on Security
Aug 27, 2014 - Aug 29, 2014 Hirosaki, Japan Mar 10, 2014 (Mar 3, 2014)
IWSEC 2011 International Workshop on Security
Nov 8, 2011 - Nov 10, 2011 Tokyo, Japan Apr 26, 2011
IWSEC 2010 The 5th International Workshop on Security
Nov 22, 2010 - Nov 24, 2010 Kobe, Japan Apr 30, 2010
IWSEC 2008 3rd International Workshop on Security
Nov 25, 2008 - Nov 27, 2008 Kagawa, Japan Apr 18, 2008
 
 

Present CFP : 2022

Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2022. Topics of interest for IWSEC 2022 include all theory and practice of cryptography, information security, and network security, as in the previous IWSEC workshops. We classify the topics of interest into two tracks as follows, but not limited to:

[A: Cryptography Track]
- Applied cryptography
- Biometrics security and privacy
- Blockchain and cryptocurrency
- Cryptanalysis
- Cryptographic primitives
- Cryptographic protocols
- Financial cryptography
- Formal methods for security analysis
- Multiparty computation
- Post-quantum cryptography
- Privacy-preserving data mining
- Public-key cryptography
- Real-world cryptographic systems
- Symmetric-key cryptography

[B: Cybersecurity and Privacy Track]
- Cyberattacks and defenses
- Cyber physical systems and Internet-of-Things security
- Forensics
- Hardware security
- Internet-of-Things security
- Intrusion detection and prevention
- Law and ethics of cybersecurity
- Machine learning and AI security
- Malware analysis
- Measurements for cybersecurity
- Mobile and web security
- Network, system and cloud security
- Privacy-enhancing technologies
- Program analysis
- Usable security and privacy
 

Related Resources

CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
No Hat 2022   Computer Security Conference
IJCSITY 2022   International Journal of Computational Science and Information Technology
MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,
SI on ATD&IS II 2022   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
CLBD 2022   3rd International Conference on Cloud and Big Data
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
IJFCST 2022   International Journal on Foundations of Computer Science & Technology
DMMLACS 2022   3rd International Special Session on Data Mining and Machine Learning Applications for Cyber Security