posted by user: thngoc || 8774 views || tracked by 12 users: [display]

ISC 2017 : 20th International Information Security Conference

FacebookTwitterLinkedInGoogle


Conference Series : Information Security Conference
 
Link: http://isc2017.vgu.edu.vn
 
When Nov 22, 2017 - Nov 24, 2017
Where Ho Chi Minh city, Vietnam
Submission Deadline Jul 7, 2017
Notification Due Aug 23, 2017
Final Version Due Sep 7, 2017
 

Call For Papers

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW'97, LNCS 1396), Malaysia (ISW'99, LNCS 1729), and Australia (ISW'00, LNCS 1975), and then changed to the current name ISC when it was held in Spain in 2001 (ISC'01, LNCS 2200). Later conferences were held in Brazil (ISC'02, LNCS 2433), UK (ISC'03, LNCS 2851), California, USA (ISC'04, LNCS 3225), Singapore (ISC'05, LNCS 3650), Greece (ISC'06, LNCS 4176), Chile (ISC'07, LNCS 4779), Taipei, Taiwan (ISC'08, LNCS 5222), Italy (ISC'09, LNCS 5735), Florida, USA (ISC'10, LNCS 6531), China (ISC'11, LNCS 7001), Germany (ISC'12, LNCS 7483), and Dallas, USA (ISC'13).Hong Kong (ISC'14), Norway (ISC'15), Hawaii, USA (ISC’16).

20th Information Security Conference (ISC'17) will be held in Ho Chi Minh city, Viet Nam. The conference seeks submissions from academia, industry, and government that present novel research on all theoretical and practical aspects of Information Security.

We are greatly honored to have two esteemed keynotes at ISC 2017, that is:
- Professor Adi Shamir is a co-author of RSA public key cryptosystem, from Weizmann Institute (Israel) and École Normale Supérieure University (France).
- Dr. Thai Duong is a security and cryptography expert at Google, USA.

Areas of interest include, but are not restricted to:

access control
accountability
anonymity and pseudonymity
applied cryptography
authentication
biometrics
computer forensics
critical infrastructure security
cryptographic protocols
database security
data protection
data/system integrity
digital right management
economics of security and privacy
electronic frauds
embedded security
formal methods in security
identity management
information hiding & watermarking
intrusion detection
network security
peer-to-peer security
privacy
secure group communications
security in information flow
security for Internet of Things
security for mobile code
secure cloud computing
security in location services
security modeling & architectures
security and privacy in social networks
security and privacy in pervasive and ubiquitous computing
security of eCommerce, eBusiness and eGovernment
security models for ambient intelligence environments
trust models and trust policies
information dissemination control

* Instructions for Paper Submission:

As in all previous ISC editions, the proceedings will be published in the Springer Lecture Notes in Computer Science(LNCS) series. In this sense, all submissions are limited to 18 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length. The Springer llncs class file can be downloaded at lncs2e.zip.

Each submission must be thoroughly anonymized, with no author names, affiliations, acknowledgements, or obvious references. Submissions must not duplicate work that was published elsewhere, or work that has been submitted in parallel to any other conference, journal or workshop that has proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference. One full registration is required for every accepted paper.

*Best paper award and best student paper:

All submissions are eligible for the competitions for best paper, if one of the authors will present the paper, and best student paper, if at least one full-time student is the primary author and the presenting author at the conference. We reserve the right not to give an award.

* Committees:

- Co-General Chairs
Martin Kappes, Vietnamese German University, Vietnam, and Frankfurt am Main University, Germany.
Dinh-Thuc Nguyen, University of Science, VNU-HCM, Vietnam.

- Program Chairs
Phong Nguyen, Inria (France) and CNRS/JFLI/University of Tokyo (Japan).
Jianying Zhou, I2R, Singapore (Currently), SUTD (Singapore University of Technology and Design) (To be).

- Steering Committee
Colin Boyd, Norwegian University of Science and Technology, Norway
Ed Dawson, Queensland University of Technology, Australia
Javier Lopez, University of Malaga, Spain
Masahiro Mambo, Kanazawa University, Japan
Eiji Okamoto, University of Tsukuba, Japan
Susanne Wetzel, Stevens Institute of Technology, USA
Rui Zhang, University of Delaware, USA
Yuliang Zheng, University of Alabama at Birmingham, USA

- Program Committee
Shweta Agrawal, Indian Institute of Technology Madras, India
Gail-Joon Ahn, Arizona State University, United States
Yoshinori Aono, National Institute of Information and Communications Technology, Japan
Jean-Philippe Aumasson, Kudelski Security, United States
Gildas Avoine, INSA Rennes, France
Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong
Carlos Cid, Royal Holloway, University of London, United Kingdom
Yuval Elovici, Ben-Gurion University, Israel
Debin Gao, Singapore Management University, Singapore
Juan A. Garay, Yahoo Labs, United States
Stefanos Gritzalis, University of the Aegean, Greece
Tibor Jager, Paderborn University, Germany
Sokratis Katsikas, Norwegian University of Science and Technology, Norway
Stefan Katzenbeisser, Security Engineering Group, TU Darmstadt, Germany
Noboru Kunihiro, University of Tokyo, Japan
Qi Li, Tsinghua University, China
Zhiqiang Lin, University of Texas at Dallas, United States
Javier Lopez, University of Malaga, Spain
Mark Manulis, University of Surrey, United Kingdom
Weizhi Meng, City University of Hong Kong, Hong Kong
Chris Mitchell, University of London, United Kingdom
David Naccache, École normale supérieure, France
Khoa Nguyen, Nanyang Technological University, Singapore
Martin Ochoa, Singapore University of Technology and Design, Singapore
Tatsuaki Okamoto, Nippon Telegraph and Telephone Corporation, Japan
Yanbin Pan, Chinese Academy of Sciences, China
Duong-Hieu Phan, University of Limoges, France
Indrakshi Ray, Colorado State University, United States
Matt Robshaw, Impinj Inc., United States
Pierangela Samarati, University of Milan, Italy
Gang Tan, Penn State University, United States
Lei Wang, Shanghai Jiao Tong University, China

- Local organization board
Michael Braun, Vietnamese German University, Vietnam
Chi-Viet Ho, Vietnamese German University, Vietnam
Jae-Young Hur, Vietnamese German University, Vietnam
Quoc-Hung Nguyen, Vietnamese German University, Vietnam
Thuy-Trang Nguyen, Vietnamese German University, Vietnam
Thuan-Anh Tran, Vietnamese German University, Vietnam
Thu-Huong Tran, Vietnamese German University, Vietnam
Hong-Ngoc Tran (local chair), Vietnamese German University, Vietnam

Contact:
isc2017@vgu.edu.vn

Related Resources

ISNS 2025   The 5th Int'l Conference on Information Security and Network Security
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
ICICA 2025   2025 The 14th International Conference on Information Communication and Applications (ICICA 2025)
ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
ICISPC--EI 2025   2025 Ninth International Conference on Imaging, Signal Processing and Communications (ICISPC 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ISC 2025   ISC High Performance 2025