| |||||||||||||||
ISC 2016 : The 19th Information Security ConferenceConference Series : Information Security Conference | |||||||||||||||
Link: http://manoa.hawaii.edu/isc2016/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. ISC has been held in five continents. Papers on all technical aspects of these topics are solicited for submission. Areas of interest include, but are not restricted to:
access control accountability anonymity and pseudonymity applied cryptography authentication biometrics computer forensics critical infrastructure security cryptographic protocols database security data protection data/system integrity digital right management economics of security and privacy electronic frauds embedded security formal methods in security identity management information hiding & watermarking intrusion detection network security peer-to-peer security privacy secure group communications security in information flow security for Internet of Things security for mobile code secure cloud computing security in location services security modeling & architectures security and privacy in social networks security and privacy in pervasive and ubiquitous computing security of eCommerce, eBusiness and eGovernment security models for ambient intelligence environments trust models and trust policies economics of security and privacy information dissemination control * Important dates Submission Deadline: March 7, 2016 Decision Notification: April 25, 2016 Proceedings Version: May 23, 2016 Conference: September 7-9, 2016 * Instructions for Paper Submission As in all previous ISC editions, the proceedings will be published in the Springer Lecture Notes in Computer Science (LNCS) series. In this sense, all submissions are limited to 18 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length. Each submission must be thoroughly anonymized, with no author names, affiliations, acknowledgements, or obvious references. Submissions must not duplicate work that was published elsewhere, or work that has been submitted in parallel to any other conference, journal or workshop that has proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference. One full registration is required for every accepted paper. All submissions are eligible for the competitions for best paper, if one of the authors will present the paper and best student paper, if at least one full-time student is the primary author and the presenting author at the conference. We reserve the right not to give an award. |
|