posted by user: shingosato || 90 views || tracked by 1 users: [display]

IWSEC 2025 : The 20th International Workshop on Security (1st Submission)

FacebookTwitterLinkedInGoogle


Conference Series : International Workshop on Security
 
Link: https://www.iwsec.org/2025/index.html
 
When Nov 25, 2025 - Nov 27, 2025
Where Fukuoka, Japan
Submission Deadline Apr 3, 2025
Notification Due Jun 2, 2025
Final Version Due Jun 18, 2025
Categories    cryptography   cybersecurity   privacy   security
 

Call For Papers

#### IWSEC 2025 Call for Papers ####
The 20th International Workshop on Security
November 25 (Tue) -- November 27 (Thu), 2025
ACROS Fukuoka, Fukuoka, Japan

Web page: https://www.iwsec.org/2025
IWSEC is an annual international workshop in Japan, co-organized by
ISEC in ESS of IEICE and CSEC of IPSJ.

** Important Dates **
First submission
Submission of paper: April 3, 2025
Notification of decision: June 2, 2025
Camera-ready version due: June 18, 2025

Second submission
Submission of paper: July 17, 2025
Notification of decision: September 15, 2025
Camera-ready version due: October 1, 2025

IWSEC 2025: November 25 (Tue) -- November 27 (Thu), 2025

Original papers on the research and development of various security topics, as well as case studies and implementation experiments, are solicited for submission to IWSEC 2025. Topics of interest for IWSEC 2025 include all theory and practice of cryptography, information security, and network security, as in the previous IWSEC workshops.

-Applied cryptography
-Biometrics security and privacy
-Blockchain and cryptocurrency
-Cryptanalysis
-Cryptographic primitives
-Cryptographic protocols
-Cyber physical systems
-Cyberattacks and defenses
-Financial cryptography
-Forensics
-Formal methods for security analysis
-Hardware security
-Human-computer interaction, security, and privacy
-Internet-of-Things security
-Intrusion detection and prevention
-Law and ethics of cybersecurity
-Machine learning and AI security
-Malware analysis
-Measurements for cybersecurity
-Mobile and web security
-Multiparty computation
-Network, system and cloud security
-Offensive security
-Post-quantum cryptography
-Privacy-enhancing technologies
-Privacy-preserving data mining
-Program analysis
-Public-key cryptography
-Real-world cryptographic systems
-Software security
-Supply chain security
-Symmetric-key cryptography

** Best Paper Award **
Prizes will be awarded to the authors of the Best Paper(s) and the Best Student Paper(s). The main author should be a full-time graduate or undergraduate student as of March 2025.

** Journal Recommendation **
It is planned that Program Co-Chairs will recommend the authors of selected papers to submit their full versions to either of "IEICE Trans. on Fundamentals, Special Section on Cryptography and Information Security" or "Journal of Information Processing" after consultation between Program Co-Chairs and the authors.

** Proceedings **
It is planned to publish the conference proceedings by Springer, in the Lecture Notes in Computer Science (LNCS) Series. All of the past IWSEC proceedings have been published in LNCS.

** Instruction for Authors **
All submitted papers must be original, unpublished, and not submitted in parallel to any other peer-reviewed conferences or journals. Submitted papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references.

Authors should consult Springer's authors' guidelines and use their proceedings templates, either for LaTeX or for Word, for the preparation of their papers. Springer encourages authors to include their ORCIDs in their papers. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.

Submitted papers may contain at most 16 pages excluding appendices and references, and at most 20 pages including appendices and references. The Abstract input to EasyChair should be less than 500 words. Note that according to the latest LNCS guideline, appendices are required to be placed before the references. Figures and tables with color can be included in papers. However, these materials will appear in black and white in the conference proceedings.

Optionally, any amount of clearly marked supplementary materials may be supplied, following after the main body of the submitted paper; however, reviewers are not required to read or review them, and submissions should be intelligible without them. Supplementary materials are mostly intended for additional data such as experimental data or source code. Note that supplementary materials are not allowed to be included in the camera-ready version.

** Committees **
General Co-Chairs:
Shinsaku Kiyomoto (KDDI Research Inc., Japan)
Tatsuya Mori (Waseda University, Japan)

Program Co-Chairs:
Carlos Cid (Okinawa Institute of Science and Technology, Japan, and Simula UiB, Norway)
Naoto Yanai (Panasonic, Japan)

(Latest update: January 20, 2025)
==================================

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
Ei/Scopus-CCISS 2025   2025 2nd International Conference on Computing, Information Science and System (CCISS 2025)
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
SAI 2025   14th International Conference on Soft Computing, Artificial Intelligence and Applications