posted by user: thngoc || 6248 views || tracked by 12 users: [display]

ISC 2017 : 20th International Information Security Conference


Conference Series : Information Security Conference
When Sep 6, 2017 - Sep 8, 2017
Where Ho Chi Minh city, Vietnam
Submission Deadline Apr 28, 2017
Notification Due Jun 23, 2017
Final Version Due Jul 7, 2017

Call For Papers

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW'97, LNCS 1396), Malaysia (ISW'99, LNCS 1729), and Australia (ISW'00, LNCS 1975), and then changed to the current name ISC when it was held in Spain in 2001 (ISC'01, LNCS 2200). Later conferences were held in Brazil (ISC'02, LNCS 2433), UK (ISC'03, LNCS 2851), California, USA (ISC'04, LNCS 3225), Singapore (ISC'05, LNCS 3650), Greece (ISC'06, LNCS 4176), Chile (ISC'07, LNCS 4779), Taipei, Taiwan (ISC'08, LNCS 5222), Italy (ISC'09, LNCS 5735), Florida, USA (ISC'10, LNCS 6531), China (ISC'11, LNCS 7001), Germany (ISC'12, LNCS 7483), and Dallas, USA (ISC'13).Hong Kong (ISC'14), Norway (ISC'15), Hawaii, USA (ISC’16).

20th Information Security Conference (ISC'17) will be held in Ho Chi Minh city, Viet Nam. The conference seeks submissions from academia, industry, and government that present novel research on all theoretical and practical aspects of Information Security.

We are greatly honored to have two esteemed keynotes at ISC 2017, that is:
- Professor Adi Shamir is a co-author of RSA public key cryptosystem, from Weizmann Institute (Israel) and École Normale Supérieure University (France).
- Dr. Thai Duong is a security and cryptography expert at Google, USA.

Areas of interest include, but are not restricted to:

access control
anonymity and pseudonymity
applied cryptography
computer forensics
critical infrastructure security
cryptographic protocols
database security
data protection
data/system integrity
digital right management
economics of security and privacy
electronic frauds
embedded security
formal methods in security
identity management
information hiding & watermarking
intrusion detection
network security
peer-to-peer security
secure group communications
security in information flow
security for Internet of Things
security for mobile code
secure cloud computing
security in location services
security modeling & architectures
security and privacy in social networks
security and privacy in pervasive and ubiquitous computing
security of eCommerce, eBusiness and eGovernment
security models for ambient intelligence environments
trust models and trust policies
information dissemination control

* Instructions for Paper Submission:

As in all previous ISC editions, the proceedings will be published in the Springer Lecture Notes in Computer Science(LNCS) series. In this sense, all submissions are limited to 18 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length. The Springer llncs class file can be downloaded at

Each submission must be thoroughly anonymized, with no author names, affiliations, acknowledgements, or obvious references. Submissions must not duplicate work that was published elsewhere, or work that has been submitted in parallel to any other conference, journal or workshop that has proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference. One full registration is required for every accepted paper.

*Best paper award and best student paper:

All submissions are eligible for the competitions for best paper, if one of the authors will present the paper, and best student paper, if at least one full-time student is the primary author and the presenting author at the conference. We reserve the right not to give an award.

* Committees:

- Co-General Chairs
Martin Kappes, Vietnamese German University, Vietnam, and Frankfurt am Main University, Germany.
Dinh-Thuc Nguyen, University of Science, VNU-HCM, Vietnam.

- Program Chairs
Phong Nguyen, Inria (France) and CNRS/JFLI/University of Tokyo (Japan).
Jianying Zhou, I2R, Singapore (Currently), SUTD (Singapore University of Technology and Design) (To be).

- Steering Committee
Colin Boyd, Norwegian University of Science and Technology, Norway
Ed Dawson, Queensland University of Technology, Australia
Javier Lopez, University of Malaga, Spain
Masahiro Mambo, Kanazawa University, Japan
Eiji Okamoto, University of Tsukuba, Japan
Susanne Wetzel, Stevens Institute of Technology, USA
Rui Zhang, University of Delaware, USA
Yuliang Zheng, University of Alabama at Birmingham, USA

- Program Committee
Shweta Agrawal, Indian Institute of Technology Madras, India
Gail-Joon Ahn, Arizona State University, United States
Yoshinori Aono, National Institute of Information and Communications Technology, Japan
Jean-Philippe Aumasson, Kudelski Security, United States
Gildas Avoine, INSA Rennes, France
Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong
Carlos Cid, Royal Holloway, University of London, United Kingdom
Yuval Elovici, Ben-Gurion University, Israel
Debin Gao, Singapore Management University, Singapore
Juan A. Garay, Yahoo Labs, United States
Stefanos Gritzalis, University of the Aegean, Greece
Tibor Jager, Paderborn University, Germany
Sokratis Katsikas, Norwegian University of Science and Technology, Norway
Stefan Katzenbeisser, Security Engineering Group, TU Darmstadt, Germany
Noboru Kunihiro, University of Tokyo, Japan
Qi Li, Tsinghua University, China
Zhiqiang Lin, University of Texas at Dallas, United States
Javier Lopez, University of Malaga, Spain
Mark Manulis, University of Surrey, United Kingdom
Weizhi Meng, City University of Hong Kong, Hong Kong
Chris Mitchell, University of London, United Kingdom
David Naccache, École normale supérieure, France
Khoa Nguyen, Nanyang Technological University, Singapore
Martin Ochoa, Singapore University of Technology and Design, Singapore
Tatsuaki Okamoto, Nippon Telegraph and Telephone Corporation, Japan
Yanbin Pan, Chinese Academy of Sciences, China
Duong-Hieu Phan, University of Limoges, France
Indrakshi Ray, Colorado State University, United States
Matt Robshaw, Impinj Inc., United States
Pierangela Samarati, University of Milan, Italy
Gang Tan, Penn State University, United States
Lei Wang, Shanghai Jiao Tong University, China

- Local organization board
Michael Braun, Vietnamese German University, Vietnam
Chi-Viet Ho, Vietnamese German University, Vietnam
Jae-Young Hur, Vietnamese German University, Vietnam
Quoc-Hung Nguyen, Vietnamese German University, Vietnam
Thuy-Trang Nguyen, Vietnamese German University, Vietnam
Thuan-Anh Tran, Vietnamese German University, Vietnam
Thu-Huong Tran, Vietnamese German University, Vietnam
Hong-Ngoc Tran (local chair), Vietnamese German University, Vietnam


Related Resources

CRITIS 2021   The 16th International Conference on Critical Information Infrastructures Security
ICSRS--Scopus & EI 2021   2021 5th International Conference on System Reliability and Safety (ICSRS 2021)--Scopus & EI Compendex
Elec-SI-IIDS 2021   Special Issue on Design of Intelligent Intrusion Detection Systems
ICENT--EI Compendex, Scopus 2021   2021 3rd International Conference on Emerging Networks Technologies (ICENT 2021)--Ei Compendex, Scopus
IWoSR 2021   2021 International Workshop on Service Robotics (IWoSR 2021)
ICONIP 2021   The 28th International Conference on Neural Information Processing (ICONIP2021)
ICCIS--IEEE, Ei and Scopus 2021   IEEE--2021 5th International Conference on Communication and Information Systems (ICCIS 2020)--Ei Compendex, Scopus
ECNLPIR 2021   2021 European Conference on Natural Language Processing and Information Retrieval (ECNLPIR 2021)
CCNC 2021   IEEE Consumer Communications & Networking Conference