posted by user: jhyi00 || 4055 views || tracked by 4 users: [display]

WISA 2014 : The 15th International Workshop on Information Security Applications

FacebookTwitterLinkedInGoogle


Conference Series : Workshop on Information Security Applications
 
Link: http://wisa.or.kr/
 
When Aug 25, 2014 - Aug 27, 2014
Where Jeju Island, Korea
Submission Deadline Jun 20, 2014
Notification Due Jul 25, 2014
Final Version Due Aug 1, 2014
Categories    informatio security   applied cryptography
 

Call For Papers

The 15th International Workshop on Information Security Applications (WISA 2014) will be held on Jeju Island, Korea on August 25-27, 2014. It is hosted by the Korea Institute of Information Security and Cryptology (KIISC) and sponsored by the Ministry of Science, ICT and Future Planning (MSIP). It is also co-sponsored by the Electronics & Telecommunications Research Institute (ETRI), the Korea Internet & Security Agency (KISA), and the National Security Research Institute (NSRI). The primary focus of WISA 2014 is on systems and network security, and the secondary focus is on all other technical and practical aspects of security applications. The workshop will serve as a forum for new results from the academic research community as well as from the industry.

The areas of interest include, but are not limited to:

• Analysis of network and security protocols
• Anonymity and censorship-resistant technologies
• Applications of cryptographic techniques
• Authentication and authorization
• Automated tools for source code/binary analysis
• Botnet defense
• Critical infrastructure security
• Denial-of-service attacks and countermeasures
• Digital Forensics
• Embedded systems security
• Exploit techniques and automation
• Hardware and physical security
• HCI security and privacy
• Intrusion detection and prevention
• Malware analysis
• Mobile/wireless/cellular system security
• Network-based attacks
• Network infrastructure security
• Operating system security
• Practical cryptanalysis (hardware, DRM, etc.)
• Security policy
• Storage and file system security
• Techniques for developing secure systems
• Trustworthy computing
• Vulnerability research
• Web security


SCIE JOURNAL RECOMMENDATION OF SELECTED PAPAERS

Expanded versions of selected papers will be recommended to peer-reviewed international journals indexed in SCI or SCIE. For this, now we are discussing with the following journals (subject to change):

• International Journal of Distributed Sensor Networks (IJDSN) - Hindawi (SCIE): Confirmed!!
• Journal of Supercomputing (JoS) - Springer (SCI)
• Applied Mathematics & Information Sciences (AMIS) – Natural Science Publishing (SCIE)
• Journal of Applied Mathematics (JAM) - Hindawi (SCIE)


PAPER SUBMISSION

Authors are invited to submit their original papers to the following EDAS system for review: http://edas.info/N17961.


INSTRUCTIONS FOR AUTHORS

Authors must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to journals or any other conferences that have proceedings. The EDAS system automatically checks the similarity using the paper similarity detection tool.

The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. The paper should be prepared according to the "Authors Instruction for LNCS" (http://www.springer.de/comp/lncs/authors.html) and limited to at most 12 pages in total.

Related Resources

CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
ICICT 2025   IEEE--2025 The 8th International Conference on Information and Computer Technologies (ICICT 2025)
ICBDA 2025   IEEE--2025 the 10th International Conference on Big Data Analytics (ICBDA 2025)
ICGDA--EI 2025   2025 8th International Conference on Geoinformatics and Data Analysis (ICGDA 2025)
ICMIP 2025   2025 10th International Conference on Multimedia and Image Processing (ICMIP 2025)
Springer ICIM 2025   Springer--2025 the 11th International Conference on Information Management (ICIM 2025)
ACM SAC DBDM Track 2025   CFP: ACM SAC DBDM Track
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2