posted by user: rahsaan13 || 603 views || tracked by 1 users: [display]

MobiSec 2025 : The 9th International Conference on Mobile Internet Security

FacebookTwitterLinkedInGoogle

Link: https://www.manuscriptlink.com/society/kiisc/conference/mobisec2025
 
When Dec 16, 2025 - Dec 18, 2025
Where Hotel Emisia Sapporo, Sapporo, Japan
Submission Deadline Sep 19, 2025
Notification Due Oct 20, 2025
Final Version Due Nov 2, 2025
Categories    mobile security   5g/6g security   iot security   cryptography
 

Call For Papers

===============================================================================
CALL for PAPERS
===============================================================================

MobiSec 2025

The 9th International Conference on Mobile Internet Security

https://www.manuscriptlink.com/society/kiisc/conference/mobisec2025

Sapporo, Japan. December 16~18, 2025

Organized By
KIISC Research Group on 6G Security
Electronics and Telecommunications Research Institute (ETRI)

Hosted By
Korea Institute of Information Security and Cryptology (KIISC)

===============================================================================

NEWS
-------------------------------------
(1) Call for Papers is released in July 22nd, 2025 (KST/JST)
(2) Submission deadline is extended to September 19th, 2025 (KST/JST)
(3) Springer CCIS was approved for the post-proceedings of MobiSec 2025
(4) The IEICE Transactions on Information and Systems "Special Section on Next-Generation Security for Mobile Internet and Digital
Ecosystems" was approved and associated with MobiSec 2025


IMPORTANT DATES
-------------------------------------
- Regular paper submission deadline: September 19, 2025 (KST/JST)
- Poster submission deadline: October 22, 2025 (KST/JST)
- Acceptance Notification: October 20, 2025 (KST/JST)
- Final version deadline: November 2, 2025 (KST/JST)


OVERVIEW
-------------------------------------
During the past two decades, mobile internet technologies have been dramatically growing
while leading to a paradigm shift in our life. Despite their revolution, mobile internet technologies open doors to various security threats, which should be addressed to keep mobile Internet environments to be secure and trust.

Even worse, the latest technologies (e.g., 6G Networks, Quantum Computing, Generative AI, and so forth) continuously have introduced new security challenges. Therefore, it is of paramount importance to study mobile internet security.

The purpose of MobiSec 2025 is to bring together the academic and industry working on different aspects, exchange ideas, and explore new research directions for addressing the challenges in mobile internet security and application of cyber security.

MobiSec 2025 also aims to publish high quality papers, which are closely related to various theories and practical applications in mobility management and cyber security to highlight the state-of-art research. In spite of focusing on security aspects, this conference welcomes papers which are related to mobile internet technologies and emerging issues in cyber space.

We expect that MobiSec 2025 will be a trigger for further research and technology improvements related to this important subject.


TOPICS (not limited to)
------------------------
- Security for 5G/6G and Next-Generation Mobile Networks
- Quantum Security
- Mobile, Wireless, and Cellular System Security
- Network/Edge/Cloud Security and Infrastructure Protection
- Data Security and Privacy in Edge and Distributed Environments
- (Post-Quantum) Cryptography, Lightweight/Advanced Encryption, and Side-Channel Countermeasures
- Security for IoT and Cyber-Physical Systems
- Embedded Systems and Hardware Security
- Trusted Execution Environments and Trustworthy Computing
- Security for AI Systems and Applications of AI in Security (e.g., AI-Driven Threat Detection)
- Digital Forensics and Malware Analysis in Mobile Ecosystems
- Secure Access Control, Authentication, and Authorization
- Secure Protocol Design and Real-World Protocol Analysis
- Blockchain and Distributed Ledger Security
- Supply Chain Security and Digital Platform Ecosystem Resilience
- Automated Tools for Software/Binary Vulnerability Analysis
- Operating System, Storage, and File System Security
- Web and Application Security
- HCI Security and Privacy (e.g., for Wearables and Smart Devices)
- Security for Unmanned Systems (Vehicles, Drones, Ships)
- Denial-of-Service Attacks and Botnet Defense
- Exploit Techniques, Vulnerability Research, and Practical Cryptanalysis
- Privacy-Preserving Technologies (e.g., Anonymity, Anti-Censorship Tools)
- Security Policy, Management, and Governance Models
- Safety and Security Issues in Digital Transformation and Industry 4.0/5.0 Platforms
- Emerging Trends and Challenges in Mobile Internet and Application Security
- Case Studies and Practical Security Applications in Real-World Environments
- Others and Emerging New Topics in Mobile Internet Security


CONFERENCE ORGANIZATION
-------------------------------------
##Honorary Chairs
-Il Yeon Cho (ETRI, South Korea)
-Fang-Yie Leu (ThungHai University, Taiwan)
-Kouichi Sakurai (Kyushu University, Japan)

##Steering Chairs
-Koji Nakao (NICT/Yokohama National University, Japan)
-Ilsun You (Kookmin University, South Korea)

##General Chairs
-Kiwook Sohn (Seoul National University of Science & Technology, South Korea)
-Goichiro Hanaoka (AIST, Japan)
-Jeong Nyeo Kim (ETRI, South Korea)o

##Program Committee Chairs
-Hwankuk Kim (Kookmin University, South Korea)
-SeongHan Shin (AIST, Japan)
-Antonio Skarmeta (University of Murcia, Spain)

##Program Committee
-Ramón Alcarria (Universidad Politécnica de Madrid, Spain)
-Pelin Angin (Middle East Technical University, Republic of Türkiye)
-Ram Basnet (Colorado Mesa University, USA)
-Daniele Bringhenti (The Polytechnic University of Turin, Italy)
-Yuanlong Cao (Jiangxi Normal University, China)
-Gaurav Choudhary (University of Southern Denmark, Denmark)
-Yen-Fu Chung (ThungHai University, Taiwan)
-Baojiang Cui (BUPT, China)
-Steven Duong (University of Wollongong)
-Jianfeng Guan (BUPT, China)
-Shoichi Hirose (University of Fukui, Japan)
-Huisu Jang (Soongsil University, South Korea)
-Sanghoon Jeon (Kookmin University, South Korea)
-Anuchit Jitpattanakul (KMUTNB, Thailand)
-Jongkil Kim (Ewha Womans University, South Korea)
-Taeguen Kim (Soonchunhyang University, South Korea)
-Youngsoo Kim (ETRI, South Korea)
-Dowon Kim (KISA, South Korea)
-Hyun Kwon (Korea Militaray Academy, South Korea)
-Mun-Kyu Lee (Inha University, South Korea)
-C. Mala (National Institute of Technology, Tiruchirapalli, India)
-Sakorn Mekruksavanich (University of Phayao, Thailand)
-Alessio Merlo (CASD, School of Advanced Defense Studies, Italy)
-Moonhong Min (SKKU, South Korea)
-Hoonyong Park (AUTOCRYPT, South Korea)
-Seongmin Park (KISA, South Korea)
-Marek Pawlicki (Bydgoszcz University of Science and Technology, Poland)
-SeogChung Seo (Kookmin University, South Korea)
-DaeMin Shin (Financial Security Institute, South Korea)
-Kunwar Singh (NIT Trichy, India)
-Toi Tomita (Yokohama National University)
-Kunlin Tsai (Tunghai University, Taiwan)
-Noriki Uchida (Fukuoka Institute of Technology, Japan)
-Sang Uk Shin (Pukyong National University, South Korea)
-Fulvio Valenza (Polytechnic University of Turin, Italy)
-Luca Verderame (DIBRIS - University of Genova, Italy)
-Elena Vlahu-Gjorgievska (University of Wollongong, Australia)
-Yohei Watanabe (The University of Electo-Communications, Japan)
-Jie Xu (BUPT, China)
-Akihiro Yamamura (Akita University, Japan)
-Toshihiro Yamauchi (Okayama University, Japan)
-Baokang Zhao (NUDT, China)

##Poster Chairs
-Jiyoon Kim (Gyeongsang National University, South Korea)
-Il-Gu Lee (Sungshin Women's University, South Korea)
-Jungsoo Park (Kangnam University, South Korea)

##Workshop Chairs
-Shingo Sato (Yokohama National University, Japan)
-Jong-Geun Park (ETRI, South Korea)
-Taek-Young Youn (Dankook University, South Korea)

##Special Session Chairs
-Yuta Kodera (Okayama University, Japan)
-Ki-Woong Park (Sejong University, South Korea)

##Local Arrangement Chairs
-Hyungrok Jo (Yokohama National University, Japan)
-Bonam Kim (Kookmin University, South Korea)

##International Liaison Chairs
-Yuntao Wang (The University of Electro-Communications, Japan)
-Karl Andersson (Luleå University of Technology, Sweden)

##Publicity Chairs
-Kuo-Hui Yeh (National Yang Ming Chiao Tung University, Taiwan)
-Su Hyun Kim (SoonChunHyang University, South Korea)

##Publication Chair
-Philip Astilo (University of San Carlos, Philippines)


SUBMISSION GUIDELINES
-----------------------
All papers must be original and not simultaneously submitted to another journal or conference.
The contributions to MobiSec 2025 must be submitted to the conference submission system:
https://easychair.org/conferences?conf=mobisec2025

(1) Regular Paper

Authors are invited to submit original papers: they must not substantially duplicate work
that any of the authors have published elsewhere or have submitted in parallel to
any other conferences that have proceedings. An accepted paper must be registered before
the registration deadline and presented at the conference. Failure to register before
the deadline will result in automatic withdrawal of the paper from the conference
proceedings and the program.

- The submission must be anonymous, with no author names, affiliations, acknowledgements, or obvious references.
- The submission file is in PDF or PS file format produced via
@the Easychair Latex Class file (US letter size) [Available at https://easychair.org/publications/easychair.zip]
@the Easychair Microsoft Word file [Available at https://easychair.org/publications/easychair.docx]
- The length of the submission should at least 5 pages long, not exceed 20 pages in the Easychair style,
excluding the bibliography and clearly marked appendices.
- Submission of a paper implies that should the paper be accepted,
at least one of the authors will register and present the paper at the conference.
- During submission, authors need to select "MobiSec 2025 - Main Track" for their paper.

(2) Poster Paper

The submission should be a single PDF document consisting of (i) the poster abstract and (ii) the poster draft.
Poster abstract: Poster abstract should provide sufficient details about your research showing that you have adequate information to fill a poster.
Poster abstract should meet the following requirements:
- No more than 2-pages, including references and figures
- Submission should not be anonymized
- The submission file is in PDF or PS file format produced via the Easychair Latex Class file (US letter size) like Regular Paper.

Poster draft: All submission must also include draft of the poster to receive feedback from the committee before the conference.
Poster size should be 32x40 inches but can be scaled down to "letter" paper size.

The accepted posters will not be formally published, and their copyright will be owned by their authors.
Therefore, authors can present or publish any content of their poster in other conference or journal.
Moreover, we will welcome the latest research outcomes, which were introduced at other venue.

During submission, please select "MobiSec 2025 - Poster Track"


PROCEEDINGS & POST PUBLICATIONS:
-----------------------
-All accepted papers will be made available to participants in the preliminary online proceedings (non-official publication) during the conference.
-Following our tradition, a selected set of high-quality papers presented at MobiSec 2025 will be invited for publication in
the Springer Communications in Computer and Information Science (CCIS) series (indexed by Scopus), after appropriate revision and expansion.
-The IEICE Transactions on Information and Systems announces that it will publish a special section entitled
"Special Section on Next-Generation Security for Mobile Internet and Digital Ecosystem" which is associated with the 9th International Conference on Mobile Internet Security (MobiSec
2025), one of the leading international conferences on mobile and cyber security. The call is open not only to
authors who participated in MobiSec 2025 but also to all researchers and professionals working in relevant fields.
-Other accepted papers may also be considered for publication, in extended and revised form, in reputable SCIE or Scopus-indexed journals.

CONTACT
----------
For further information, please contact MobiSec 2025 cyber chair via cyberchair.mobisec@gmail.com

Related Resources

BIOTC 2026   2026 8th Blockchain and Internet of Things Conference (BIOTC 2026)
CAIJ 2025   Computer Applications: An International Journal
EI/Scopus-ICCBD 2025   2025 2nd International Conference on Cloud Computing and Big Data-EI/Scopus
IJMA 2025   International Journal of Multimedia & Its Applications -- ERA Indexed, H index - 24
ICITS--EI 2026   2026 The 14th International Conference on Information Technology and Science (ICITS 2026)
SSR 2025   Security Standardisation Research Conference 2025
CCCN--EI 2026   2026 The 4th International Conference on Cloud Computing and Computer Network (CCCN 2026)
JMICRO 2025   International Journal of Microwave Engineering
IEEE ICBDA 2026   IEEE--2026 11th International Conference on Big Data Analytics (ICBDA 2026)
INTERNET 2026   The Eighteenth International Conference on Evolving Internet