会議情報
ICISC 2015: International Conference on Information Security and Cryptology
会議のウェブサイトを表示するにはログインしてください
提出日: |
2015-09-07 Extended |
通知日: |
2015-10-19 |
会議日: |
2015-11-25 |
場所: |
Seoul, Korea |
年: |
18 |
CORE: b 閲覧: 24724 追跡: 29 出席: 2
論文募集
OVERVIEW
Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2015, the 18th Annual International Conference on Information Security and Cryptology which is sponsored by KIISC (Korean Institute of Information Security and Cryptology), Korea.
TOPICS of INTEREST INCLUDE, but are not limited to:
Access Control & Audit
Authentication and Authorization
Biometrics
Block and Stream Ciphers
Cloud Computing Security
Copyright Protection
Cryptanalysis
Cryptographic Protocol
Digital Forensics
Digital Signature
Distributed Systems Security
Efficient Implementation
Electronic Commerce
Hash Function
Homomorphic Encryption
Identity Management
ID-based Cryptography
Information Hiding
Intrusion Detection and Prevention
Key Management
Mobile Security
Privacy Enhancement
Public Key Cryptography
Secure Multiparty Computation
Security Management
Security Policy
Side Channel Attacks and Countermeasures
Smart Device Security
Social Network Security
Software Security
INSTRUCTIONS for AUTHORS
Submissions must not substantially duplicate work that any of the authors have published elsewhere or submitted in parallel to any other conference or workshop that has proceedings. The paper should start with a title, an abstract and keywords, but must be anonymous. The length of the submission should not exceed 12 pages excluding the bibliography and clearly marked appendices, using at least 10 point fonts and reasonable margins. Since committee members are not required to read the appendices, the paper should be intelligible without them. All papers must be in Portable Document Format (PDF). It is strongly recommended that submissions be processed using LaTeX2e according to the instruction at http://www.springer.de/comp/lncs/ authors.html. Authors of accepted papers must guarantee that their paper will be presented at the conference.
ELECTRONIC SUBMISSION: https://secure.iacr.org/websubrev/icisc2015/submit/
Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2015, the 18th Annual International Conference on Information Security and Cryptology which is sponsored by KIISC (Korean Institute of Information Security and Cryptology), Korea.
TOPICS of INTEREST INCLUDE, but are not limited to:
Access Control & Audit
Authentication and Authorization
Biometrics
Block and Stream Ciphers
Cloud Computing Security
Copyright Protection
Cryptanalysis
Cryptographic Protocol
Digital Forensics
Digital Signature
Distributed Systems Security
Efficient Implementation
Electronic Commerce
Hash Function
Homomorphic Encryption
Identity Management
ID-based Cryptography
Information Hiding
Intrusion Detection and Prevention
Key Management
Mobile Security
Privacy Enhancement
Public Key Cryptography
Secure Multiparty Computation
Security Management
Security Policy
Side Channel Attacks and Countermeasures
Smart Device Security
Social Network Security
Software Security
INSTRUCTIONS for AUTHORS
Submissions must not substantially duplicate work that any of the authors have published elsewhere or submitted in parallel to any other conference or workshop that has proceedings. The paper should start with a title, an abstract and keywords, but must be anonymous. The length of the submission should not exceed 12 pages excluding the bibliography and clearly marked appendices, using at least 10 point fonts and reasonable margins. Since committee members are not required to read the appendices, the paper should be intelligible without them. All papers must be in Portable Document Format (PDF). It is strongly recommended that submissions be processed using LaTeX2e according to the instruction at http://www.springer.de/comp/lncs/ authors.html. Authors of accepted papers must guarantee that their paper will be presented at the conference.
ELECTRONIC SUBMISSION: https://secure.iacr.org/websubrev/icisc2015/submit/
最終更新 Dou Sun 2015-09-03
関連会議
| CCF | CORE | QUALIS | 省略名 | 完全な名前 | 提出日 | 通知日 | 会議日 |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2026-07-10 | 2026-09-10 | 2026-12-16 | |
| c | ACISP | Australasian Conference on Information Security and Privacy | 2026-02-26 | 2026-04-16 | 2026-07-06 | ||
| c | INSCRYPT | International Conference on Information Security and Cryptology | 2025-06-15 | 2025-08-01 | 2025-10-19 | ||
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| b | ISPEC | International Conference on Information Security Practice and Experience | 2024-05-13 | 2024-06-24 | 2024-10-25 | ||
| c | WISTP | International Conference on Information Security Theory and Practice | 2024-01-15 | 2024-02-05 | 2024-02-29 | ||
| b4 | EIT | International Conference on Electro/Information Technology | 2016-02-15 | 2016-03-15 | 2016-05-19 | ||
| c | ISA' | International Conference on Information Security and Assurance | 2016-01-30 | 2016-02-15 | 2016-03-24 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 |
関連仕訳帳
| CCF | 完全な名前 | インパクト ・ ファクター | 出版社 | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| Information Technology & People | 5.6 | Emerald | 0959-3845 | |
| b | Information and Software Technology | 4.3 | Elsevier | 0950-5849 |
| Ethics and Information Technology | 4.0 | Springer | 1388-1957 | |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| The Information Society | 3.0 | Taylor & Francis | 0197-2243 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |