| |||||||||||||
ICISC 2016 : The 19th Annual International Conference on Information Security and CryptologyConference Series : International Conference on Information Security and Cryptology | |||||||||||||
Link: http://www.icisc.org/icisc/asp/ICISC%202016_CFP.pdf | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
ICISC 2016
Call for papers The 19th Annual International Conference on Information Security and Cryptology November 30 (Wed) ~ December 2 (Fri), 2016, Seoul, Korea http://www.icisc.org/ Organizing Committee Chair: Okyeon Yi (Kookmin University, Korea) PC Co-chairs: Seokhie Hong (Korea University, Korea), Jong Hwan Park (Sangmyung University, Korea) Submission August 26, 2016 18:00 KST (GMT + 9 hr) Acceptance notification October 21, 2016 Proceedings version deadline November 4, 2016 ICISC 2016 Conference November 30 ~ December 2, 2016 Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2016, the 19th Annual International Conference on Information Security and Cryptology which is sponsored by KIISC (Korean Institute of Information Security and Cryptology), Korea. Especially, ICISC 2016 will plan to organize a special session on the subject of post-quantum cryptography. ● Post-quantum cryptography ● Biometrics ● Cloud Computing Security ● Cryptanalysis ● Digital Forensics ● Distributed Systems Security ● Electronic Commerce ● Homomorphic Encryption ● ID-based Cryptography ● Intrusion Detection and Prevention ● Mobile Security ● Public Key Cryptography ● Side Channel Attacks and Countermeasures ● Software Security ● Authentication and Authorization ● Block and Stream Ciphers ● Copyright Protection ● Cryptographic Protocol ● Digital Signature ● Efficient Implementation ● Hash Function ● Identity Management ● Information Hiding ● Key Management ● Privacy Enhancement ● Secure Multiparty Computation ● Social Network Security ● Smart Device Security Submissions must not substantially duplicate work that any of the authors have published elsewhere or submitted in parallel to any other conference or workshop that has proceedings. The paper should start with a title, an abstract and keywords, but must be anonymous. The length of the submission should not exceed 12 pages excluding the bibliography and clearly marked appendices, using at least 10 point fonts and reasonable margins. Since committee members are not required to read the appendices, the paper should be intelligible without them. All papers must be in PDF format. It is strongly recommended that submissions be processed using LaTeX2e according to the instruction at http://www.springer.de/comp/lncs/authors.html. Authors of accepted papers must guarantee that their paper will be presented at the conference. CONFERENCE PROCEEDINGS INSTRUCTIONS for AUTHORS TOPICS of INTEREST INCLUDE, but are not limited to: OVERVIEW IMPORTANT DATES The proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science. |
|