IWSEC 2012 - The 7th International Workshop on Security (IWSEC 2012)
Topics/Call fo Papers
IWSEC Web Page: http://www.iwsec.org/
Jointly organized by ISEC of IEICE and CSEC of IPSJ
[Important Dates]
* Submission deadline: May 14, 2012 (23:59 UTC)
* Notification of decision: July 13, 2012
* Final version due: August 6, 2012
* Workshop: November 7-9, 2012
--- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * ---
IWSEC 2012 Call for Papers
The 7th International Workshop on Security (IWSEC 2012)
November 7-9, 2012
Nishijin Plaza, Kyushu University, Fukuoka, Japan
IWSEC Web Page: http://www.iwsec.org/
Jointly organized by ISEC of IEICE and CSEC of IPSJ
[Important Dates]
* Submission deadline: May 14, 2012 (23:59 UTC)
* Notification of decision: July 13, 2012
* Final version due: August 6, 2012
* Workshop: November 7-9, 2012
[Overview]
Original papers on the research and development of various security
topics are solicited for submission to IWSEC 2012. Topics of interest
for IWSEC 2012 include but are not limited to:
I: Foundations of Security
Authentication
Biometrics
Block/Stream Ciphers
Cryptographic Protocols
Cryptanalysis
Digital Signatures
Hash Functions
Information Hiding
Public Key Cryptosystems
Quantum Security
Cryptographic Implementations and their Analysis
II: Security in Networks and Ubiquitous Computing Systems
Network Security
Intrusion Detection
Malware Detection
Security in Sensor Networks
Security of Ubiquitous and Cloud Computing
Security of Multi-party Computing
Authorization and Access Control
Mobile Security
Privacy Enhancing Technology
Anonymity-related Technology
Privacy Preserving System
Privacy on WEB and DB
Software Security
Security Architectures
Data and System Integrity
Reliable Secure Interactions of Services
System Security
Operating System Security, Trusted Computing
III: Security in Real Life Applications
Secure Living and Working Environments
Secure Consumer Electronics
RFID Security
Security in Commerce and Government
DRM
Copyright Protection
Content Security E-business/e-commerce/e-government Security
Security Management
Access Control Policies and ISMS
Business Processes Security
Protection of Critical Infrastructures
Critical Infrastructure Protection
Risk Analysis and Risk Management
Testing, Verification and Certification
Security Verification
Assurance
Law, Policy, Ethics and Related Technologies
Digital Forensics
Information Law and Ethics
[Instructions for Authors]
Submitted papers must be original, unpublished, and not submitted to
other conferences or journals for consideration for publication. Papers
must be written in English and be fully anonymous with no author names,
affiliations, acknowledgements, or obvious references. They should be at
most 16 pages long in total (including bibliography and appendices), in
the standard LNCS format (except for author names and affiliations).
Submissions to IWSEC 2012 should be submitted electronically in PDF
format. A detailed description of the electronic submission procedure
will available at the workshop website. Submissions not meeting the
submission guidelines risk rejection without consideration of their
merits. At least one author of each accepted paper is required to
register with the workshop and present the paper.
[Proceedings]
Proceedings will be published in Springer-Verlag's Lecture Notes in
Computer Science series.
[Best Paper Awards]
Prizes will be awarded to the authors of the best paper(s) and the
best student paper(s).
[Committees]
General Chairs:
Tsutomu Matsumoto, Yokohama National University, Japan
Kanta Matsuura, The University of Tokyo, Japan
Program Chairs:
Goichiro Hanaoka, AIST, Japan
Toshihiro Yamauchi, Okayama University, Japan
Program Committee Members :
Rafael Accorsi, University of Freiburg, Germany
Claudio Ardagna, Universita degli Studi di Milano, Italy
Nuttapong Attrapadung, AIST, Japan
Andrey Bogdanov, Katholieke Universiteit Leuven, Belgium
Kevin Butler, University of Oregon, USA
Sanjit Chatterjee, Indian Institute of Science, India
Haibo Chen, Shanghai Jiao Tong University, China
Pau-Chen Cheng, IBM Thomas J Watson Research Center, USA
Koji Chida, NTT, Japan
Bart De Decker, Katholieke Universiteit Leuven, Belgium
Isao Echizen, National Institute of Informatics, Japan
Dario Fiore, New York University, USA
Georg Fuchsbauer, University of Bristol, UK
Eiichiro Fujisaki, NTT, Japan
Steven Furnell, University of Plymouth, UK
David Galindo, University of Malaga, Spain
Dieter Gollmann, Hamburg University of Technology, Germany
Swee-Huay Heng, Multimedia University, Malaysia
Jin Hong, Seoul National University, Korea
Tetsu Iwata, Nagoya University, Japan
Angelos D. Keromytis, Columbia University, USA
Hyung Chan Kim, ETRI, Korea
Takeshi Koshiba, Saitama University, Japan
Noboru Kunihiro, University of Tokyo, Japan
Kwok-Yan Lam, Tsinghua University, China
Benoit Libert, Universite Catholique de Louvain, Belgium
Javier Lopez, University of Malaga, Spain
Keith Martin, Royal Holloway, University of London, UK
Masakatsu Nishigaki, Shizuoka University, Japan
Wakaha Ogata, Tokyo Institute of Technology, Japan
Thomas Peyrin, Nanyang Technological University, Singapore
Raphael Phan, Loughborough University, UK
Axel Poschmann, Nanyang Technological University, Singapore
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Kai Rannenberg, Goethe University Frankfurt, Germany
Kazuo Sakiyama, University of Electro-Communications, Japan
Ryoichi Sasaki, Tokyo Denki University, Japan
Joshua Schiffman, Pennsylvania State University, USA
Jae Hong Seo, NICT, Japan
Francesco Sica, University of Waterloo, Canada
Tsuyoshi Takagi, Kyushu University, Japan
Keisuke Takemori, KDDI R&D Laboratories Inc., Japan
Keisuke Tanaka, Tokyo Institute of Technology, Japan
Masayuki Terada, NTT DoCoMo, Japan
Ryuya Uda, Tokyo University of Technology, Japan
Damien Vergnaud, ENS, France
Sabrina De Capitani di Vimercati, University of Milan, Italy
Guilin Wang, University of Wollongong, Australia
Jian Weng, Jinan University, China
Sven Wohlgemuth, National Institute of Informatics, Japan
Keita Xagawa, NTT, Japan
Chung-Huang Yang, National Kaohsiung Normal University, Taiwan
Kazuki Yoneyama, NTT, Japan
Katsunari Yoshioka, Yokohama National University, Japan
Hiroshi Yoshiura, University of Electro-Communications, Japan
Rui Zhang, CAS, China
Yunlei Zhao, Fudan University, China
Local Organizing Committee:
Yoshiaki Hori, Kyushu University, Japan
Takuro Hosoi, The University of Tokyo, Japan
Mitsugu Iwamoto, The University of Electro-Communications, Japan
Takehisa Kato, Toshiba Solutions Corporation, Japan
Akinori Kawachi, Tokyo Institute of Technology, Japan
Fagen Li, Kyushu University, Japan
Kirill Morozov, Kyushu University, Japan
Takashi Nishide, Kyushu University, Japan
Masayuki Numao, The University of Electro-Communications, Japan
Naoyuki Shinohara, National Institute of Information and Communications Technology, Japan
Mio Suzuki, National Institute of Information and Communications Technology, Japan
Tsuyoshi Takagi, Kyushu University, Japan
Kenji Yasunaga, Institute of Systems, Information Technologies and Nanotechnologies, Japan
(Last Update: April 25 2012)
--- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * ---
Jointly organized by ISEC of IEICE and CSEC of IPSJ
[Important Dates]
* Submission deadline: May 14, 2012 (23:59 UTC)
* Notification of decision: July 13, 2012
* Final version due: August 6, 2012
* Workshop: November 7-9, 2012
--- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * ---
IWSEC 2012 Call for Papers
The 7th International Workshop on Security (IWSEC 2012)
November 7-9, 2012
Nishijin Plaza, Kyushu University, Fukuoka, Japan
IWSEC Web Page: http://www.iwsec.org/
Jointly organized by ISEC of IEICE and CSEC of IPSJ
[Important Dates]
* Submission deadline: May 14, 2012 (23:59 UTC)
* Notification of decision: July 13, 2012
* Final version due: August 6, 2012
* Workshop: November 7-9, 2012
[Overview]
Original papers on the research and development of various security
topics are solicited for submission to IWSEC 2012. Topics of interest
for IWSEC 2012 include but are not limited to:
I: Foundations of Security
Authentication
Biometrics
Block/Stream Ciphers
Cryptographic Protocols
Cryptanalysis
Digital Signatures
Hash Functions
Information Hiding
Public Key Cryptosystems
Quantum Security
Cryptographic Implementations and their Analysis
II: Security in Networks and Ubiquitous Computing Systems
Network Security
Intrusion Detection
Malware Detection
Security in Sensor Networks
Security of Ubiquitous and Cloud Computing
Security of Multi-party Computing
Authorization and Access Control
Mobile Security
Privacy Enhancing Technology
Anonymity-related Technology
Privacy Preserving System
Privacy on WEB and DB
Software Security
Security Architectures
Data and System Integrity
Reliable Secure Interactions of Services
System Security
Operating System Security, Trusted Computing
III: Security in Real Life Applications
Secure Living and Working Environments
Secure Consumer Electronics
RFID Security
Security in Commerce and Government
DRM
Copyright Protection
Content Security E-business/e-commerce/e-government Security
Security Management
Access Control Policies and ISMS
Business Processes Security
Protection of Critical Infrastructures
Critical Infrastructure Protection
Risk Analysis and Risk Management
Testing, Verification and Certification
Security Verification
Assurance
Law, Policy, Ethics and Related Technologies
Digital Forensics
Information Law and Ethics
[Instructions for Authors]
Submitted papers must be original, unpublished, and not submitted to
other conferences or journals for consideration for publication. Papers
must be written in English and be fully anonymous with no author names,
affiliations, acknowledgements, or obvious references. They should be at
most 16 pages long in total (including bibliography and appendices), in
the standard LNCS format (except for author names and affiliations).
Submissions to IWSEC 2012 should be submitted electronically in PDF
format. A detailed description of the electronic submission procedure
will available at the workshop website. Submissions not meeting the
submission guidelines risk rejection without consideration of their
merits. At least one author of each accepted paper is required to
register with the workshop and present the paper.
[Proceedings]
Proceedings will be published in Springer-Verlag's Lecture Notes in
Computer Science series.
[Best Paper Awards]
Prizes will be awarded to the authors of the best paper(s) and the
best student paper(s).
[Committees]
General Chairs:
Tsutomu Matsumoto, Yokohama National University, Japan
Kanta Matsuura, The University of Tokyo, Japan
Program Chairs:
Goichiro Hanaoka, AIST, Japan
Toshihiro Yamauchi, Okayama University, Japan
Program Committee Members :
Rafael Accorsi, University of Freiburg, Germany
Claudio Ardagna, Universita degli Studi di Milano, Italy
Nuttapong Attrapadung, AIST, Japan
Andrey Bogdanov, Katholieke Universiteit Leuven, Belgium
Kevin Butler, University of Oregon, USA
Sanjit Chatterjee, Indian Institute of Science, India
Haibo Chen, Shanghai Jiao Tong University, China
Pau-Chen Cheng, IBM Thomas J Watson Research Center, USA
Koji Chida, NTT, Japan
Bart De Decker, Katholieke Universiteit Leuven, Belgium
Isao Echizen, National Institute of Informatics, Japan
Dario Fiore, New York University, USA
Georg Fuchsbauer, University of Bristol, UK
Eiichiro Fujisaki, NTT, Japan
Steven Furnell, University of Plymouth, UK
David Galindo, University of Malaga, Spain
Dieter Gollmann, Hamburg University of Technology, Germany
Swee-Huay Heng, Multimedia University, Malaysia
Jin Hong, Seoul National University, Korea
Tetsu Iwata, Nagoya University, Japan
Angelos D. Keromytis, Columbia University, USA
Hyung Chan Kim, ETRI, Korea
Takeshi Koshiba, Saitama University, Japan
Noboru Kunihiro, University of Tokyo, Japan
Kwok-Yan Lam, Tsinghua University, China
Benoit Libert, Universite Catholique de Louvain, Belgium
Javier Lopez, University of Malaga, Spain
Keith Martin, Royal Holloway, University of London, UK
Masakatsu Nishigaki, Shizuoka University, Japan
Wakaha Ogata, Tokyo Institute of Technology, Japan
Thomas Peyrin, Nanyang Technological University, Singapore
Raphael Phan, Loughborough University, UK
Axel Poschmann, Nanyang Technological University, Singapore
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Kai Rannenberg, Goethe University Frankfurt, Germany
Kazuo Sakiyama, University of Electro-Communications, Japan
Ryoichi Sasaki, Tokyo Denki University, Japan
Joshua Schiffman, Pennsylvania State University, USA
Jae Hong Seo, NICT, Japan
Francesco Sica, University of Waterloo, Canada
Tsuyoshi Takagi, Kyushu University, Japan
Keisuke Takemori, KDDI R&D Laboratories Inc., Japan
Keisuke Tanaka, Tokyo Institute of Technology, Japan
Masayuki Terada, NTT DoCoMo, Japan
Ryuya Uda, Tokyo University of Technology, Japan
Damien Vergnaud, ENS, France
Sabrina De Capitani di Vimercati, University of Milan, Italy
Guilin Wang, University of Wollongong, Australia
Jian Weng, Jinan University, China
Sven Wohlgemuth, National Institute of Informatics, Japan
Keita Xagawa, NTT, Japan
Chung-Huang Yang, National Kaohsiung Normal University, Taiwan
Kazuki Yoneyama, NTT, Japan
Katsunari Yoshioka, Yokohama National University, Japan
Hiroshi Yoshiura, University of Electro-Communications, Japan
Rui Zhang, CAS, China
Yunlei Zhao, Fudan University, China
Local Organizing Committee:
Yoshiaki Hori, Kyushu University, Japan
Takuro Hosoi, The University of Tokyo, Japan
Mitsugu Iwamoto, The University of Electro-Communications, Japan
Takehisa Kato, Toshiba Solutions Corporation, Japan
Akinori Kawachi, Tokyo Institute of Technology, Japan
Fagen Li, Kyushu University, Japan
Kirill Morozov, Kyushu University, Japan
Takashi Nishide, Kyushu University, Japan
Masayuki Numao, The University of Electro-Communications, Japan
Naoyuki Shinohara, National Institute of Information and Communications Technology, Japan
Mio Suzuki, National Institute of Information and Communications Technology, Japan
Tsuyoshi Takagi, Kyushu University, Japan
Kenji Yasunaga, Institute of Systems, Information Technologies and Nanotechnologies, Japan
(Last Update: April 25 2012)
--- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * ---
Other CFPs
- C2C workshop
- 2013 IET International Conference on Information and Communications Technologies
- Asia-Pacific Power and Energy Engineering Conference (APPEEC 2013)
- The 3rd International Conference on Computer and Management (CAMAN 2013)
- International Journal of Social Media and Interactive Learning Environments (IJSMILE)
Last modified: 2012-05-02 15:58:18