posted by user: homaei || 1275 views || tracked by 2 users: [display]

ISCISC 2024 : The 21st International ISC Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle

Link: https://iscisc2024.modares.ac.ir/en
 
When Oct 16, 2024 - Oct 17, 2024
Where Tehran, Iran
Submission Deadline Jul 21, 2024
Notification Due Aug 31, 2024
Categories    cyber security   computer security   privacy   computer science
 

Call For Papers

ISCISC is an annual international conference that explores the field of information and communication security research. It actively invites submissions from both academia and industry, highlighting groundbreaking studies across a wide spectrum of topics. These encompass the theoretical foundations and practical applications of cyber security. The topics of interest include, but are not limited to:
- Foundations of cryptology:
--- Symmetric cryptographic algorithms
--- Asymmetric and cryptographic algorithms and digital signatures
--- Hash functions
--- Information-theoretic security
--- New methods in cryptography (functional cryptography, homomorphic cryptography, ...)
- Implementation of cryptographic algorithms and related attacks:
--- Software and hardware implementation of cryptographic algorithms
--- Side channel attacks and countermeasures
--- Embedded cryptographic systems
--- Hardware tampering and countermeasures
--- Cryptographic hardware accelerators
--- Cryptographic implementation analysis
- Network security
--- Mobile and wireless network security
--- Network infrastructure security
--- Network intrusion detection and prevention
--- Denial-of-service attacks and countermeasures
--- Security analysis of network protocols
- Security protocols
--- Authentication and identification protocols
--- Anonymity, privacy, and trust management
--- Zero-knowledge protocols and proofs
--- Secure multiparty computation
--- Cryptanalysis of security protocols
--- Attacks against security protocols
--- Formal verification of security protocols
- Security methods and models
--- Access control and authorization
--- Anonymity, privacy, and trust management
--- Security and privacy policies and metrics
--- Threat modeling and analysis
--- Trust and security models
--- Formal methods and models
- Security of computation
--- Hardware security
--- Operating system security
--- Database security
--- Web security
--- Mobile application security
--- Fuzzing and vulnerability discovery
--- Malware Analysis
- Security and privacy management
--- Information security management system
--- Security architectures
--- Risk Management
--- Information security training
--- E-business and e-banking security
--- E-health security
--- E-banking security
--- E-learning security
--- Privacy-Enhancing Technologies
- Information hiding
--- Steganography and watermarking
--- Steganalysis
--- Applications of Information hiding
- Digital forensics
--- Digital forensics techniques and tools
--- Database and network forensics
--- Mobile device forensics
--- Cybercrime forensics
- Recent topics in cryptography and security
--- Quantum and Post-quantum cryptography
--- Artificial Intelligence (AI) Security and privacy
--- Blockchain technology and cryptocurrency
--- Internet of Things (IoT), big data and cloud security
--- Cyber-physical systems security
--- Adversarial machine learning
--- Security of social networks, metaverse, and augmented reality-based networks

The International ISC Conference on Information Security and Cryptology welcomes researchers, developers, and practitioners to submit their original papers and organize workshops on all aspects of cryptology and information security. For each accepted paper, at least one author must register for the conference and ensure that their paper is presented in-person. Non-local authors have the opportunity to present their papers online. Accepted papers will be published in a special issue of the ISeCure journal (indexed in WoS-JCR, SCImago-SJR, and Scopus among other indexing services.)

All manuscripts must be submitted in EDAS (https://edas.info/N31896). Submitted papers must not substantially overlap with papers that have already been published or accepted for publication, or that are simultaneously under review by a journal, conference, or workshop with published proceedings. Submissions must be a PDF file in ISeCure format (https://www.isecure-journal.com/journal/authors.note), no more than 8 pages long (up to 11 pages is acceptable with extra-page fee). Each paper submitted for evaluation to the conference is expected to obtain three quality reviews.

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SEAS 2025   14th International Conference on Software Engineering and Applications
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)