posted by user: 80khs || 2551 views || tracked by 1 users: [display]

ICISC 2022 : 25th Annual International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information Security and Cryptology
 
Link: http://www.icisc.org/
 
When Nov 30, 2022 - Dec 2, 2022
Where Hotel Koreana, Seoul
Submission Deadline Sep 2, 2022
Notification Due Nov 11, 2022
Final Version Due Nov 16, 2022
Categories    cryptography   computer security
 

Call For Papers

Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2022, the 25th Annual International Conference on Information Security and Cryptology which is sponsored by KIISC (Korean Institute of Information Security and Cryptology), Korea.

● Cryptography Track
- Authentication and Authorization
- Biometrics
- Blockchain Security
- Block and Stream Ciphers
- Copyright Protection
- Cryptographic Protocols
- Cryptanalysis
- Digital Forensics
- Digital Signature
- Distributed Systems Security
- Efficient Cryptography Implementation
- Functional encryption
- Hash Function
- Homomorphic Encryption
- ID-based Cryptography
- Intrusion Detection and Prevention
- Information Hiding
- Key Management
- Post-quantum cryptography
- Privacy Enhancement
- Public Key Cryptography
- Side Channel Attacks and Countermeasures
- Secure Multiparty Computation
- Software Security
- Smart Device Security
- Zero-knowledge proofs

● Security Track
- Analysis of network and security protocols
- Anonymity and censorship-resistant technologies
- Applications of cryptographic techniques
- Authentication and authorization
- Automated tools for source code/binary analysis
- Automobile security
- Botnet defense
- Critical infrastructure security
- Denial-of-service attacks and countermeasures
- Embedded systems security
- Exploit techniques and automation
- Hardware and physical security
- HCI security and privacy
- Malware analysis
- Mobile/wireless/cellular system security
- Network-based attacks
- Network infrastructure security
- Operating system security
- Practical cryptanalysis (hardware, DRM, etc.)
- Security policy
- Techniques for developing secure systems
- Trustworthy computing
- Trusted execution environments
- Unmanned System Security
- Vulnerability research
- Web Security

Related Resources

InCIT 2024   The 8th International Conference on Information Technology
CST 2024   11th International Conference on Advances in Computer Science and Information Technology
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
LAJC 2024   Latin-American Journal of Computing
CyberHunt 2024   7th Annual Workshop on Cyber Threat Intelligence and Hunting in conjunction with the IEEE Big Data Conference
CRBL 2024   International Conference on Cryptography and Blockchain
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
NYC-2024-BC 2024   New York Annual Conference on Blockchain and Cryptography 2024
CRYPIS 2024   13th International Conference on Cryptography and Information Security
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust