posted by user: homaei || 1228 views || tracked by 2 users: [display]

ISCISC 2024 : The 21st International ISC Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle

Link: https://iscisc2024.modares.ac.ir/en
 
When Oct 16, 2024 - Oct 17, 2024
Where Tehran, Iran
Submission Deadline Jul 21, 2024
Notification Due Aug 31, 2024
Categories    cyber security   computer security   privacy   computer science
 

Call For Papers

ISCISC is an annual international conference that explores the field of information and communication security research. It actively invites submissions from both academia and industry, highlighting groundbreaking studies across a wide spectrum of topics. These encompass the theoretical foundations and practical applications of cyber security. The topics of interest include, but are not limited to:
- Foundations of cryptology:
--- Symmetric cryptographic algorithms
--- Asymmetric and cryptographic algorithms and digital signatures
--- Hash functions
--- Information-theoretic security
--- New methods in cryptography (functional cryptography, homomorphic cryptography, ...)
- Implementation of cryptographic algorithms and related attacks:
--- Software and hardware implementation of cryptographic algorithms
--- Side channel attacks and countermeasures
--- Embedded cryptographic systems
--- Hardware tampering and countermeasures
--- Cryptographic hardware accelerators
--- Cryptographic implementation analysis
- Network security
--- Mobile and wireless network security
--- Network infrastructure security
--- Network intrusion detection and prevention
--- Denial-of-service attacks and countermeasures
--- Security analysis of network protocols
- Security protocols
--- Authentication and identification protocols
--- Anonymity, privacy, and trust management
--- Zero-knowledge protocols and proofs
--- Secure multiparty computation
--- Cryptanalysis of security protocols
--- Attacks against security protocols
--- Formal verification of security protocols
- Security methods and models
--- Access control and authorization
--- Anonymity, privacy, and trust management
--- Security and privacy policies and metrics
--- Threat modeling and analysis
--- Trust and security models
--- Formal methods and models
- Security of computation
--- Hardware security
--- Operating system security
--- Database security
--- Web security
--- Mobile application security
--- Fuzzing and vulnerability discovery
--- Malware Analysis
- Security and privacy management
--- Information security management system
--- Security architectures
--- Risk Management
--- Information security training
--- E-business and e-banking security
--- E-health security
--- E-banking security
--- E-learning security
--- Privacy-Enhancing Technologies
- Information hiding
--- Steganography and watermarking
--- Steganalysis
--- Applications of Information hiding
- Digital forensics
--- Digital forensics techniques and tools
--- Database and network forensics
--- Mobile device forensics
--- Cybercrime forensics
- Recent topics in cryptography and security
--- Quantum and Post-quantum cryptography
--- Artificial Intelligence (AI) Security and privacy
--- Blockchain technology and cryptocurrency
--- Internet of Things (IoT), big data and cloud security
--- Cyber-physical systems security
--- Adversarial machine learning
--- Security of social networks, metaverse, and augmented reality-based networks

The International ISC Conference on Information Security and Cryptology welcomes researchers, developers, and practitioners to submit their original papers and organize workshops on all aspects of cryptology and information security. For each accepted paper, at least one author must register for the conference and ensure that their paper is presented in-person. Non-local authors have the opportunity to present their papers online. Accepted papers will be published in a special issue of the ISeCure journal (indexed in WoS-JCR, SCImago-SJR, and Scopus among other indexing services.)

All manuscripts must be submitted in EDAS (https://edas.info/N31896). Submitted papers must not substantially overlap with papers that have already been published or accepted for publication, or that are simultaneously under review by a journal, conference, or workshop with published proceedings. Submissions must be a PDF file in ISeCure format (https://www.isecure-journal.com/journal/authors.note), no more than 8 pages long (up to 11 pages is acceptable with extra-page fee). Each paper submitted for evaluation to the conference is expected to obtain three quality reviews.

Related Resources

IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
ISNS 2025   The 5th Int'l Conference on Information Security and Network Security
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus