posted by user: solowal || 1665 views || tracked by 3 users: [display]

ICISC 2024 : The 27th Annual International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information Security and Cryptology
 
Link: http://icisc.org/
 
When Nov 20, 2024 - Nov 22, 2024
Where Seoul
Submission Deadline Sep 6, 2024
Notification Due Oct 30, 2024
Final Version Due Nov 6, 2024
Categories    cryptography   cyber security
 

Call For Papers

Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2024, the 27th Annual International Conference on Information Security and Cryptology which is sponsored by NSR(National Security Research Institute) and KIISC (Korean Institute of Information Security and Cryptology), Korea.

Cryptography Track
● Authentication and Authorization
● Biometrics
● Blockchain Security
● Block and Stream Ciphers
● Copyright Protection
● Cryptographic Protocols
● Cryptanalysis
● Digital Forensics
● Digital Signature
● Distributed Systems Security
● Efficient Cryptography Implementation
● Functional encryption
● Hash Function
● Homomorphic Encryption
● ID-based Cryptography
● Intrusion Detection and Prevention
● Information Hiding
● Key Management
● Post-quantum cryptography
● Privacy Enhancement
● Public Key Cryptography
● Side Channel Attacks and Countermeasures
● Secure Multiparty Computation
● Software Security
● Smart Device Security
● Zero-knowledge proofs

Security Track
● Analysis of network and security protocols
● Anonymity and censorship-resistant technologies
● Applications of cryptographic techniques
● Authentication and authorization
● Automated tools for source code/binary analysis
● Automobile security
● Botnet defense
● Critical infrastructure security
● Denial-of-service attacks and countermeasures
● Embedded systems security
● Exploit techniques and automation
● Hardware and physical security
● HCI security and privacy
● Malware analysis
● Mobile/wireless/cellular system security
● Network-based attacks
● Network infrastructure security
● Operating system security
● Practical cryptanalysis (hardware, DRM, etc.)
● Security policy
● Techniques for developing secure systems
● Trustworthy computing
● Trusted execution environments
● Unmanned System Security
● Vulnerability research
● Web Security

Related Resources

ICIIT--EI 2026   2026 11th International Conference on Intelligent Information Technology (ICIIT 2026)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICIEE--EI 2026   2026 15th International Conference on Information and Electronics Engineering (ICIEE 2026)
ISC 2025   Information Security Conference
ICIIT 2026   2026 11th International Conference on Intelligent Information Technology (ICIIT 2026)
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
Springer ICIM 2026   Springer--2026 the 12th International Conference on Information Management (ICIM 2026)
SecITC 2025   The 18th International Conference on Security for Information Technology and Communications
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
IVSP 2026   2026 8th International Conference on Image, Video and Signal Processing (IVSP 2026)