征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW'97, LNCS 1396), Malaysia (ISW'99, LNCS 1729), and Australia (ISW'00, LNCS 1975), and then changed to the current name ISC when it was held in Spain in 2001 (ISC'01, LNCS 2200). Later conferences were held in Brazil (ISC'02, LNCS 2433), UK (ISC'03, LNCS 2851), California, USA (ISC'04, LNCS 3225), Singapore (ISC'05, LNCS 3650), Greece (ISC'06, LNCS 4176), Chile (ISC'07, LNCS 4779), Taipei, Taiwan (ISC'08, LNCS 5222), Italy (ISC'09, LNCS 5735), Florida, USA (ISC'10, LNCS 6531), China (ISC'11, LNCS 7001), Germany (ISC'12, LNCS 7483), and Dallas, USA (ISC'13).Hong Kong (ISC'14), Norway (ISC'15), Hawaii, USA (ISC’16).

The 20th Information Security Conference (ISC'17) will be held in Ho Chi Minh city, Viet Nam. This event is hosted by Vietnamese German University (VGU) in Ho Chi Minh city, Viet Nam. The conference seeks submissions from academia, industry, and government that present novel research on all theoretical and practical aspects of Information Security.

Furthermore, we are greatly honored to have Prof. Adi Sharmir from Weizmann Institute (Israel) who is the co-inventor of the well-known RSA cryptosystem, and Dr. Thai Duong, a security expert from Google, USA, as keynotes of ISC 2017.

征稿信息

重要日期

2017-07-07
初稿截稿日期
2017-08-23
初稿录用日期
2017-09-07
终稿截稿日期

征稿范围

Areas of interest include, but are not restricted to:

  • access control

  • accountability

  • anonymity and pseudonymity

  • applied cryptography

  • authentication

  • biometrics

  • computer forensics

  • critical infrastructure security

  • cryptographic protocols

  • database security

  • data protection

  • data/system integrity

  • digital right management

  • economics of security and privacy

  • electronic frauds

  • embedded security

  • formal methods in security

  • identity management

  • information hiding & watermarking

  • intrusion detection

  • network security

  • peer-to-peer security

  • privacy

  • secure group communications

  • security in information flow

  • security for Internet of Things

  • security for mobile code

  • secure cloud computing

  • security in location services

  • security modeling & architectures

  • security and privacy in social networks

  • security and privacy in pervasive and ubiquitous computing

  • security of eCommerce, eBusiness and eGovernment

  • security models for ambient intelligence environments

  • trust models and trust policies

  • information dissemination control

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    11月22日

    2017

    11月24日

    2017

  • 07月07日 2017

    初稿截稿日期

  • 08月23日 2017

    初稿录用通知日期

  • 09月07日 2017

    终稿截稿日期

  • 11月24日 2017

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询