The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW'97, LNCS 1396), Malaysia (ISW'99, LNCS 1729), and Australia (ISW'00, LNCS 1975), and then changed to the current name ISC when it was held in Spain in 2001 (ISC'01, LNCS 2200). Later conferences were held in Brazil (ISC'02, LNCS 2433), UK (ISC'03, LNCS 2851), California, USA (ISC'04, LNCS 3225), Singapore (ISC'05, LNCS 3650), Greece (ISC'06, LNCS 4176), Chile (ISC'07, LNCS 4779), Taipei, Taiwan (ISC'08, LNCS 5222), Italy (ISC'09, LNCS 5735), Florida, USA (ISC'10, LNCS 6531), China (ISC'11, LNCS 7001), Germany (ISC'12, LNCS 7483), and Dallas, USA (ISC'13).Hong Kong (ISC'14), Norway (ISC'15), Hawaii, USA (ISC’16).
The 20th Information Security Conference (ISC'17) will be held in Ho Chi Minh city, Viet Nam. This event is hosted by Vietnamese German University (VGU) in Ho Chi Minh city, Viet Nam. The conference seeks submissions from academia, industry, and government that present novel research on all theoretical and practical aspects of Information Security.
Furthermore, we are greatly honored to have Prof. Adi Sharmir from Weizmann Institute (Israel) who is the co-inventor of the well-known RSA cryptosystem, and Dr. Thai Duong, a security expert from Google, USA, as keynotes of ISC 2017.
Areas of interest include, but are not restricted to:
access control
accountability
anonymity and pseudonymity
applied cryptography
authentication
biometrics
computer forensics
critical infrastructure security
cryptographic protocols
database security
data protection
data/system integrity
digital right management
economics of security and privacy
electronic frauds
embedded security
formal methods in security
identity management
information hiding & watermarking
intrusion detection
network security
peer-to-peer security
privacy
secure group communications
security in information flow
security for Internet of Things
security for mobile code
secure cloud computing
security in location services
security modeling & architectures
security and privacy in social networks
security and privacy in pervasive and ubiquitous computing
security of eCommerce, eBusiness and eGovernment
security models for ambient intelligence environments
trust models and trust policies
information dissemination control
11月22日
2017
11月24日
2017
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
留言