会议信息
ISCISC 2019: International ISC Conference on Information Security and Cryptology
http://iscisc2019.um.ac.ir/index.php?lang=en
截稿日期:
2019-06-02 Extended
通知日期:
2019-07-22
会议日期:
2019-08-28
会议地点:
Mashhad, Iran
届数:
16
浏览: 8803   关注: 0   参加: 1

征稿
For the past fifteen years, the International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) has been the flagship conference in information security and cryptology in Iran. The 16th ISCISC conference (ISCISC'2019) is organized by Ferdowsi University of Mashhad, Mashhad, Iran from August 28th to 29th, 2019 in co-operation with the Iranian Society of Cryptology.

The objective of ISCISC'2019 is to bring together researchers, engineers, and practitioners interested in various aspects of information security and cryptology. The conference aims to provide a forum for academicians, engineers, specialists, and students from all around the world to meet and discuss the latest developments in theory and practice in various areas of information security. ISCISC'2019 encourages researchers, developers and practitioners to submit their original papers and organize workshops on various new emerging topics. Keynote/plenary talks and panel discussions are another conference highlight.

Topics

Foundations of cryptology
Foundation of cryptology
Symmetric cryptographic algorithms
Asymmetric and cryptographic algorithms and digital signatures
Hash functions
New methods in cryptography (post-quantum cryptography, functional cryptography, homomorphic cryptography, …
Information theoretic security

Implementation of cryptographic algorithms and related attacks
Software and hardware implementation of cryptographic algorithms
Side channel attacks and countermeasures
Embedded cryptographic systems
Hardware tampering and countermeasures
Cryptographic hardware accelerators
Verification and fault detection of implementations

Network security
Wireless and mobile network security
Security of network infrastructures
Security of network protocols and layers
Intrusion detection and prevention systems
Security of critical infrastructures

Cryptography and security protocols
Authentication and identification protocols
Anonymity, privacy and trust management
Cryptanalysis of security protocols
Trust and security models
Formal methods in information security

Security of computation
Security in computer architecture
Operating system security
Database security
Analysis of security and vulnerability of software and application programs
Security and privacy in mobile devices
Security of cloud computing
Access control

Security of data, systems and applications
Social engineering in security
Information security management system (ISMS)
Information security training
E-business and e-service security
E-health security
E-banking security
E-learning security

Information hiding
New algorithms in steganography and watermarking
Attack modeling and watermarking
Steganalysis
Applications of Information hiding

Digital forensics
Digital forensics methods
Database and network forensics
Fraud detection
Tamper detection and prevention

Special topics of ISCISC2019 conference

Security Regulations for Industrial Control Systems
Cyber security master plan for critical infrastructures (Electricity, Water, Oil & Gas, Transportation)
Common threats and vulnerabilities of industrial control systems
Cost analysis on security of industrial control systems
Native products for securing industrial control systems
Security architecture of industrial control systems
Security of SCADA systems
Standards and best practices in various industries
Security for the Internet of Things (IoT)
最后更新 Dou Sun 在 2019-05-09
相关会议
推荐