ISC 2015 - Eighteenth Information Security Conference (ISC 2015)
Date2015-09-09 - 2015-09-11
Deadline2015-04-27
VenueTrondheim, Norway
Keywords
Websitehttps://isc2015.item.ntnu.no
Topics/Call fo Papers
The Information Security Conference (ISC), which started as a workshop (ISW) in 1997, is a well-established and highly reputable international conference that is held yearly. It has been held in five different continents.
Important dates
Paper submission deadline: April 27, 2015
Acceptance notification: June 12, 2015
Proceedings version: July 1, 2015
Conference: September 9-11, 2015
The conference seeks submissions on novel theoretical and practical results in:
access control
accountability
anonymity and pseudonymity
applied cryptography
authentication
biometrics
computer forensics
critical infrastructure security
cryptographic protocols
database security
data protection
data/system integrity
digital right management
economics of security and privacy
electronic frauds
embedded security
formal methods in security
identity management
information dissemination control
information hiding & watermarking
intrusion detection
network security
peer-to-peer security
privacy
secure group communications
security in information flow
security for Internet of Things
security for mobile code
secure cloud computing
security in location services
security modeling & architectures
security and privacy in social networks
security and privacy in pervasive and ubiquitous computing
security of eCommerce, eBusiness and eGovernment
security models for ambient intelligence environments
trust models and trust policies
Instructions for paper submission
As in all previous ISC editions, we plan to publish the proceedings in the Springer LNCS series. In this sense, all submissions are limited to 18 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length.
Each submission must be thoroughly anonymized, with no author names, affiliations, acknowledgements, or obvious references. Submissions must not duplicate work that was published elsewhere, or work that has been submitted in parallel to any other conference, journal or workshop that has proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference.
All submissions are eligible for the competitions for:
best paper, if one of the authors will present the paper
best student paper, if at least one full-time student is the primary author and the presenting author at the conference
(We reserve the right not to give an award.)
http://isc2015.item.ntnu.no/pdfs/cfp.pdf
Important dates
Paper submission deadline: April 27, 2015
Acceptance notification: June 12, 2015
Proceedings version: July 1, 2015
Conference: September 9-11, 2015
The conference seeks submissions on novel theoretical and practical results in:
access control
accountability
anonymity and pseudonymity
applied cryptography
authentication
biometrics
computer forensics
critical infrastructure security
cryptographic protocols
database security
data protection
data/system integrity
digital right management
economics of security and privacy
electronic frauds
embedded security
formal methods in security
identity management
information dissemination control
information hiding & watermarking
intrusion detection
network security
peer-to-peer security
privacy
secure group communications
security in information flow
security for Internet of Things
security for mobile code
secure cloud computing
security in location services
security modeling & architectures
security and privacy in social networks
security and privacy in pervasive and ubiquitous computing
security of eCommerce, eBusiness and eGovernment
security models for ambient intelligence environments
trust models and trust policies
Instructions for paper submission
As in all previous ISC editions, we plan to publish the proceedings in the Springer LNCS series. In this sense, all submissions are limited to 18 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length.
Each submission must be thoroughly anonymized, with no author names, affiliations, acknowledgements, or obvious references. Submissions must not duplicate work that was published elsewhere, or work that has been submitted in parallel to any other conference, journal or workshop that has proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference.
All submissions are eligible for the competitions for:
best paper, if one of the authors will present the paper
best student paper, if at least one full-time student is the primary author and the presenting author at the conference
(We reserve the right not to give an award.)
http://isc2015.item.ntnu.no/pdfs/cfp.pdf
Other CFPs
- AIM@EPIA 2015 : Artificial Intelligence in Medicine
- Online Learning Summer School
- World Congress and Exhibition on Construction and Steel Structure
- The ASAR-International Conference on Electrical, Electronics and Computer Engineering(ASAR-ICEECE-2015)
- IRAJ-International Conference on Electrical, Electronics, Computer Science and Mechanical Engineering (ICEECSME)
Last modified: 2015-02-21 15:12:47