ICISC 2012 - International Conference on Information Security and Cryptology
Date2012-11-28 - 2012-11-30
Deadline2012-08-28
VenueSeoul, South Korea
Keywords
Websitehttps://www.icisc.org
Topics/Call fo Papers
The 15th Annual International Conference on Information Security and Cryptology
November 28 ~ November 30, 2012, Seoul, Korea
http://www.icisc.org/
Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2012, the 15th Annual International Conference on Information Security and Cryptology which is sponsored by KIISC (Korean Institute of Information Security and Cryptology), Korea
Topics of Interest include, but are not limited to:
? Access Control & Audit
? Authentication and Authorization
? Biometrics
? Block/Stream Ciphers
? Computer Forensics
? Copyright Protection
? Cryptographic Protocols
? Cryptanalysis
? Digital Signatures
? Distributed Systems Security
? Efficient Implementations
? Electronic Commerce
? Elliptic Curve Cryptosystems
? Hash Function
? Information Hiding
? Internet/Intranet Security
? Intrusion Detection
? Key/Identity Management
? Malicious Codes
? Mobile Communications Security
? Public Key Cryptosystems
? Public Key Infrastructure
? Secret Sharing
? Security Management
? Side Channel Cryptanalysis
? Smart Cards/Java Cards
? Zero Knowledge
Instructions for Authors
Submission should not substantially duplicate work that any of the authors have published elsewhere or submitted in parallel to any other conference or workshop that has proceedings. The paper must start with a title, an abstract and keywords, but should be anonymous. The length of the submission should not exceed 12 pages excluding the bibliography and clearly marked appendices, using at least 11 point fonts and reasonable margins. Since committee members are not required to read the appendices, the paper should be intelligible without them. All papers must be in PostScript (PS) or Portable Document Format (PDF). It is strongly recommended that submissions be processed using LaTeX2e according to the instruction at http://www.springer.de/comp/lncs/authors.html. Authors of accepted papers must guarantee that their paper will be presented at the conference.
Details on the electronic submission process will be available on ICISC web site, http://www.icisc.org/
Conference Proceedings
The proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science.
November 28 ~ November 30, 2012, Seoul, Korea
http://www.icisc.org/
Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2012, the 15th Annual International Conference on Information Security and Cryptology which is sponsored by KIISC (Korean Institute of Information Security and Cryptology), Korea
Topics of Interest include, but are not limited to:
? Access Control & Audit
? Authentication and Authorization
? Biometrics
? Block/Stream Ciphers
? Computer Forensics
? Copyright Protection
? Cryptographic Protocols
? Cryptanalysis
? Digital Signatures
? Distributed Systems Security
? Efficient Implementations
? Electronic Commerce
? Elliptic Curve Cryptosystems
? Hash Function
? Information Hiding
? Internet/Intranet Security
? Intrusion Detection
? Key/Identity Management
? Malicious Codes
? Mobile Communications Security
? Public Key Cryptosystems
? Public Key Infrastructure
? Secret Sharing
? Security Management
? Side Channel Cryptanalysis
? Smart Cards/Java Cards
? Zero Knowledge
Instructions for Authors
Submission should not substantially duplicate work that any of the authors have published elsewhere or submitted in parallel to any other conference or workshop that has proceedings. The paper must start with a title, an abstract and keywords, but should be anonymous. The length of the submission should not exceed 12 pages excluding the bibliography and clearly marked appendices, using at least 11 point fonts and reasonable margins. Since committee members are not required to read the appendices, the paper should be intelligible without them. All papers must be in PostScript (PS) or Portable Document Format (PDF). It is strongly recommended that submissions be processed using LaTeX2e according to the instruction at http://www.springer.de/comp/lncs/authors.html. Authors of accepted papers must guarantee that their paper will be presented at the conference.
Details on the electronic submission process will be available on ICISC web site, http://www.icisc.org/
Conference Proceedings
The proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science.
Other CFPs
- International Confernece on Computer Engineering and Mathematical Sciences
- IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science
- World Economics Association Sustainability Conference 2012
- International Conference and the Second East-Asian School on Logic, Language and Computation
- International Conference on Marketing Studies
Last modified: 2012-10-28 20:48:30