ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ISC 2014 - 17th Information Security Conference (ISC 2014)

Date2014-10-12 - 2014-10-14

Deadline2014-06-25

VenueHong Kong , Hong Kong SAR Hong Kong SAR

Keywords

Websitehttp://isc14.ie.cuhk.edu.hk

Topics/Call fo Papers

Information Security, the Seventeenth International Conference (ISC 2014) will be held in Hong Kong in on 12-14 October 2014. It will be organized by University of Hong Kong.
The conference time and place puts it after ProvSec 2014 in the same venue. This is a wonderful opportunity to attend two excellent security conferences in one trip!
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW'97, LNCS 1396), Malaysia (ISW'99, LNCS 1729), and Australia (ISW'00, LNCS 1975), and then changed to the current name ISC when it was held in Spain in 2001 (ISC'01, LNCS 2200). Later conferences were held in Brazil (ISC'02, LNCS 2433), UK (ISC'03, LNCS 2851), USA (ISC'04, LNCS 3225), Singapore (ISC'05, LNCS 3650), Greece (ISC'06, LNCS 4176), Chile (ISC'07, LNCS 4779), Taipei, Taiwan (ISC'08, LNCS 5222), Italy (ISC'09, LNCS 5735), Florida, USA (ISC'10, LNCS 6531), China (ISC'11, LNCS 7001), Germany (ISC'12, LNCS 7483), and Dallas, USA (ISC'13).
The conference seeks submissions from academia, industry, and government that present novel research on all theoretical and practical aspects of Information Security. We plan to publish the accepted papers in the Lecture Notes in Computer Science series published by Springer. Topics of interest include, but are not limited to:
Conference Topics: The conference seeks submissions on novel theoretical and practical results on, or on Information Security aspects of:
access control
accountability
anonymity and pseudonymity
applied cryptography
authentication
biometrics
computer forensics
cryptographic protocols
database security
data protection
data/system integrity
digital right management
economics of security and privacy
electronic frauds
formal methods in security
identity management
information dissemination control
information hiding and watermarking
intrusion detection
network security
peer-to-peer security
privacy
secure group communications
security and privacy in pervasive/ubiquitous computing
security in information flow
security in IT outsourcing
security for mobile code
secure cloud computing
security of eCommerce, eBusiness and eGovernment
security in location services
security modeling and architectures
security models for ambient intelligence environments
security in social networks
trust models and trust management policies
embedded security
Instructions for authors: All submissions should be anonymous. Authors of accepted papers must guarantee that at least one of the authors will attend the conference and present their paper. Submissions will be received electronically.
Important Dates (Tentative)
Conference date: 12-14 October 2014
Paper submission deadline: 25 June 2014
Notification of acceptance: 31 July 2014
Proceedings version deadline: 12 August 2014
Conference Organization:
General Co-Chairs:
Lucas C.K. Hui (University of Hong Kong, Hong Kong)
S.M. Yiu (University of Hong Kong, Hong Kong)
Program Co-Chairs:
Jan Camenisch (IBM Research Zurich, Switzerland)
Sherman S. M. Chow (Chinese University of Hong Kong, Hong Kong)

Last modified: 2014-04-24 22:21:54