posted by user: homaei || 300 views || tracked by 2 users: [display]

ISCISC 2024 : The 21st International ISC Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle

Link: https://iscisc2024.modares.ac.ir/
 
When Oct 16, 2024 - Oct 17, 2024
Where Tehran, Iran
Submission Deadline Jun 15, 2024
Notification Due Aug 14, 2024
Categories    cyber security   computer security   privacy   computer science
 

Call For Papers

ISCISC is an annual international conference that explores the field of information and communication security research. It actively invites submissions from both academia and industry, highlighting groundbreaking studies across a wide spectrum of topics. These encompass the theoretical foundations and practical applications of cyber security. The topics of interest include, but are not limited to:
- Foundations of cryptology:
--- Symmetric cryptographic algorithms
--- Asymmetric and cryptographic algorithms and digital signatures
--- Hash functions
--- Information-theoretic security
--- New methods in cryptography (functional cryptography, homomorphic cryptography, ...)
- Implementation of cryptographic algorithms and related attacks:
--- Software and hardware implementation of cryptographic algorithms
--- Side channel attacks and countermeasures
--- Embedded cryptographic systems
--- Hardware tampering and countermeasures
--- Cryptographic hardware accelerators
--- Verification and fault detection of implementations
- Network security
--- Wireless and mobile network security
--- Security of network infrastructures
--- Security of network protocols and layers
--- Intrusion detection and prevention systems
--- Security of critical infrastructures
- Cryptography and security models and protocols
--- Authentication and identification protocols
--- Anonymity, privacy, and trust management
--- Cryptanalysis of security protocols
--- Trust and security models
--- Formal methods in information security
--- Secure Multiparty Computation
- Security of computation
--- Security in computer architecture
--- Operating system security
--- Database security
--- Analysis of security and vulnerability of software and application programs
--- Malware Analysis
--- Security and privacy in mobile devices and applications
--- Access control
- Security and privacy management
--- Social engineering in security
--- Information security management system (ISMS)
--- Risk Management
--- Information security training
--- E-business and e-service security
--- E-health security
--- E-banking security
--- E-learning security
--- Privacy-Enhancing Technologies
- Information hiding
--- New algorithms in steganography and watermarking
--- Steganalysis
--- Applications of Information hiding
- Digital forensics
--- Digital forensics methods and tools
--- Database and network forensics
--- Mobile device forensics
--- Fraud detection
- Recent topics in cryptography and security
--- Quantum cryptography
--- Post-quantum cryptography
--- Artificial Intelligence (AI) Security
--- Blockchain technology and cryptocurrency
--- Internet of Things (IoT), big data and cloud security
--- Cyber-physical systems security
--- Soft security

The International ISC Conference on Information Security and Cryptology welcomes researchers, developers, and practitioners to submit their original papers and organize workshops on all aspects of cryptology and information security. For each accepted paper, at least one author must register for the conference and ensure that their paper is presented in-person. Non-local researchers have the opportunity to present their papers online. The accepted papers will be published in a special issue of the ISeCure journal (indexed in WoS-JCR, SCImago-SJR, and Scopus among other indexing services.)

All manuscripts must be submitted in EDAS (https://edas.info/N31896). Submitted papers must not substantially overlap with papers that have already been published or accepted for publication, or that are simultaneously under review by a journal, conference, or workshop with published proceedings. Submissions must be a PDF file in ISeCure format (https://www.isecure-journal.com/journal/authors.note), no more than 8 pages long (up to 11 pages is acceptable with extra-page fee). Each paper submitted for evaluation to the conference is expected to obtain three quality reviews.

Related Resources

IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
InCIT 2024   The 8th International Conference on Information Technology
GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
LAJC 2024   Latin-American Journal of Computing
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
IEEE ICA 2022   The 6th IEEE International Conference on Agents
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
ISC 2024   International Supercomputing Conference
SPIE-Ei/Scopus-CVCM 2024   2024 5th International Conference on Computer Vision, Communications and Multimedia (CVCM 2024) -EI Compendex