IWSEC 2014 - The 9th International Workshop on Security
Date2014-08-27 - 2014-08-29
Deadline2014-02-24
VenueHirosaki , Japan
Keywords
Websitehttps://www.iwsec.org/2014
Topics/Call fo Papers
Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2014. Topics of interest for IWSEC 2014 include but are not limited to:
Anonymity
Application Security
Authentication, Authorization and Access Control
Biometrics
Block/Stream Ciphers
Cloud Computing Security
Cryptographic Implementations and their Analysis
Cryptographic Protocols
Cryptanalysis
Data and System Integrity
Database Security
Digital Forensics
Digital Signatures
E-business/e-commerce/e-government Security
Hash Functions
Information Hiding
Information Law and Ethics
Intellectual Property Protection
Intrusion Prevention and Detection
Malware Prevention and Detection
Mobile System Security
Network Security
Privacy Preserving Systems
Public Key Cryptosystems
Quantum Security
Risk Analysis and Risk Management
Security Architectures
Security for Consumer Electronics
Security for Critical Infrastructures
Security Management
Secure Multiparty Computation
Security for Ubiquitous/Pervasive Computing
Smart Card and RFID Security
Software Security
System Security
Web Security
Instructions for Authors
Submitted papers must be original, unpublished, and not submitted to other conferences or journals for consideration for publication. Papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. They should be at most 16 pages long in total (including bibliography and appendices), in the standard LNCS format (except for author names and affiliations). Submissions to IWSEC 2014 should be submitted electronically in PDF format. A detailed description of the electronic submission procedure will available at the workshop website. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. At least one author of each accepted paper is required to register with the workshop and present the paper.
Proceedings
Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science series.
Best Paper Awards
Prizes will be awarded to the authors of the best paper(s) and the best student paper(s).
Poster Session
IWSEC2014 will have a poster session. Call for Posters will be opened soon.
Anonymity
Application Security
Authentication, Authorization and Access Control
Biometrics
Block/Stream Ciphers
Cloud Computing Security
Cryptographic Implementations and their Analysis
Cryptographic Protocols
Cryptanalysis
Data and System Integrity
Database Security
Digital Forensics
Digital Signatures
E-business/e-commerce/e-government Security
Hash Functions
Information Hiding
Information Law and Ethics
Intellectual Property Protection
Intrusion Prevention and Detection
Malware Prevention and Detection
Mobile System Security
Network Security
Privacy Preserving Systems
Public Key Cryptosystems
Quantum Security
Risk Analysis and Risk Management
Security Architectures
Security for Consumer Electronics
Security for Critical Infrastructures
Security Management
Secure Multiparty Computation
Security for Ubiquitous/Pervasive Computing
Smart Card and RFID Security
Software Security
System Security
Web Security
Instructions for Authors
Submitted papers must be original, unpublished, and not submitted to other conferences or journals for consideration for publication. Papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. They should be at most 16 pages long in total (including bibliography and appendices), in the standard LNCS format (except for author names and affiliations). Submissions to IWSEC 2014 should be submitted electronically in PDF format. A detailed description of the electronic submission procedure will available at the workshop website. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. At least one author of each accepted paper is required to register with the workshop and present the paper.
Proceedings
Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science series.
Best Paper Awards
Prizes will be awarded to the authors of the best paper(s) and the best student paper(s).
Poster Session
IWSEC2014 will have a poster session. Call for Posters will be opened soon.
Other CFPs
- LinkedUp Vidi Competition: Linked and Open Data for Education
- The 2nd International Conference on Renewable Energy for Developing Countries (REDEC’14)
- EIGHTH ANNUAL WORKSHOP ON Evolutionary Computation and Multi-Agent Systems and Simulation Workshop (ECoMASS-2014)
- Special Session on Robots for Mental Potential Development
- Special Session on Multimodality in Multiparty Interaction with Social Robots: Exploring HRI in the Real World
Last modified: 2014-02-04 21:49:29