posted by user: akirakanaoka || 8613 views || tracked by 10 users: [display]

IWSEC 2014 : International Workshop on Security

FacebookTwitterLinkedInGoogle


Conference Series : International Workshop on Security
 
Link: https://www.iwsec.org/2014/
 
When Aug 27, 2014 - Aug 29, 2014
Where Hirosaki, Japan
Abstract Registration Due Mar 3, 2014
Submission Deadline Mar 10, 2014
Notification Due May 7, 2014
Final Version Due May 25, 2014
Categories    security
 

Call For Papers

#### IWSEC 2014 Call for Papers ####

The 9th International Workshop on Security
August 27-29, 2014
Hirosaki, Japan

Web page: http://www.iwsec.org/2014/
Jointly organized by ISEC of IEICE and CSEC of IPSJ

** Important Dates **
Abstract Submission Deadline: March 3, 2014
Paper Submission Deadline: March 10, 2014
Notification: May 7, 2014
Final Version Due: May 25, 2014
IWSEC 2014 Workshop: August 27-29, 2014


Original papers on the research and development of various security
topics, as well as case studies and implementation experiences, are
solicited for submission to IWSEC 2014. Topics of interest for IWSEC
2014 include but are not limited to:

Anonymity
Application Security
Authentication, Authorization and Access Control
Biometrics
Block/Stream Ciphers
Cloud Computing Security
Cryptographic Implementations and their Analysis
Cryptographic Protocols
Cryptanalysis
Data and System Integrity
Database Security
Digital Forensics
Digital Signatures
E-business/e-commerce/e-government Security
Hash Functions
Information Hiding
Information Law and Ethics
Intellectual Property Protection
Intrusion Prevention and Detection
Malware Prevention and Detection
Mobile System Security
Network Security
Privacy Preserving Systems
Public Key Cryptosystems
Quantum Security
Risk Analysis and Risk Management
Security Architectures
Security for Consumer Electronics
Security for Critical Infrastructures
Security Management
Secure Multiparty Computation
Security for Ubiquitous/Pervasive Computing
Smart Card and RFID Security
Software Security
System Security
Web Security


** Instructions for Authors **

Submitted papers must be original, unpublished, and not submitted to
other conferences or journals for consideration for publication. Papers
must be written in English and be fully anonymous with no author names,
affiliations, acknowledgements, or obvious references. They should be at
most 16 pages long in total (including bibliography and appendices), in
the standard LNCS format (except for author names and affiliations).
Submissions to IWSEC 2014 should be submitted electronically in PDF
format. A detailed description of the electronic submission procedure
will be available at the workshop website.
Submissions not meeting the submission guidelines risk rejection without
consideration of their merits. At least one author of each accepted
paper is required to register with the workshop and present the paper.


** Proceedings **
Proceedings will be published in Springer-Verlag's Lecture Notes in
Computer Science series.

** Best Paper Awards **
Prizes will be awarded to the authors of the best paper(s) and the best
student paper(s).

** Poster Session **
IWSEC2014 will have a poster session. Call for Posters will be opened soon.


** Committees **
General co-chairs:
Kouichi Sakurai (Kyushu University)
Masakatsu Nishigaki (Shizuoka University)
Program co-chairs:
Maki Yoshida (National Institute of Information and Communications
Technology, Japan)
Koichi Mouri (Ritsumeikan University, Japan)

Program committee:
Rafael Accorsi (University of Freiburg, Germany)
Toru Akishita (Sony Corporation, Japan)
Claudio Agostino Ardagna (Universita' degli Studi di Milano, Italy)
Nuttapong Attrapadung (AIST, Japan)
Sabrina De Capitani Di Vimercati (Universita' degli Studi di Milano, Italy)
Isao Echizen (National Institute of Informatics, Japan)
Sebastian Faust (EPFL, Switzerland)
Eiichiro Fujisaki (NTT, Japan)
David Galindo (LORIA, France)
Dieter Gollmann (Hamburg University of Technology, Germany)
Goichiro Hanaoka (AIST, Japan)
Yoshikazu Hanatani (Toshiba Corporation, Japan)
Swee-Huay Heng (Multimedia University, Malaysia)
Takato Hirano (Mitsubishi Electric Corporation, Japan)
Mitsugu Iwamoto (The University of Electro-Communications, Japan)
Tetsu Iwata (Nagoya University, Japan)
Akinori Kawachi (Tokyo Institute of Technology, Japan)
Angelos Keromytis (Columbia University, USA)
Hiroaki Kikuchi (Meiji University, Japan)
Hyung Chan Kim (ETRI, Korea)
Takeshi Koshiba (Saitama University, Japan)
Kenichi Kourai (Kyushu Institute of Technology, Japan)
Noboru Kunihiro (The University of Tokyo, Japan)
Kwok-Yan Lam (Tsinghua University, China)
Kanta Matsuura (The University of Tokyo, Japan)
Koichi Mouri (Ritsumeikan University, Japan)
Ken Naganuma (Hitachi, Japan)
Takashi Nishide (University of Tsukuba, Japan)
Wakaha Ogata (Tokyo Institute of Technology, Japan)
Takeshi Okamoto (Tsukuba University of Technology, Japan)
Yoshihiro Oyama (The University of Electro-Communications, Japan)
Thomas Peyrin (Nanyang Technological University, Singapore)
Axel Poschmann (Nanyang Technological University, Singapore)
Bart Preneel (Katholieke Universiteit Leuven, Belgium)
Kai Rannenberg (Goethe University, Germany)
Shoichi Saito (Nagoya Institute of Technology, Japan)
Kazuo Sakiyama (The University of Electro-Communications, Japan)
Yu Sasaki (NTT, Japan)
Patrick Schaumont (Virginia Tech, USA)
Jae Hong Seo (Myongji University, Korea)
Masahito Shiba (Ryukoku University, Japan)
Francesco Sica (University of Waterloo, Canada)
Yuji Suga (Internet Initiative Japan, Japan)
Takeshi Sugawara (Mitsubishi Electric Corporation, Japan)
Tsuyoshi Takagi (Kyushu University, Japan)
Keisuke Tanaka (Tokyo Institute of Technology, Japan)
Masayuki Terada (NTT Docomo, Japan)
Satoru Tezuka (Tokyo University of Technology, Japan)
Damien Vergnaud (ENS, France)
Jian Weng (Jinan University, China)
Sven Wohlgemuth (TU Darmstadt, Germany)
Hiroshi Yamada (Tokyo University of Agriculture and Technology, Japan)
Dai Yamamoto (Fujitsu Laboratories, Japan)
Toshihiro Yamauchi (Okayama University, Japan)
Chung-Huang Yang (National Kaohsiung Normal University, Taiwan)
Kazuki Yoneyama (NTT, Japan)
Maki Yoshida (National Institute of Information and Communication
Technology, Japan)
Katsunari Yoshioka (Yokohama National University, Japan)
Hiroshi Yoshiura (The University of Electro-Communications, Japan)
Rui Zhang (Chinese Academy of Sciences., China)

(Last Update: February 24, 2014)

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
COIT 2025   5th International Conference on Computing and Information Technology
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
SECRYPT 2025   22nd International Conference on Security and Cryptography
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems