The Information Security Conference (ISC), which started as a workshop (ISW) in 1997, is a well-established and highly reputable international conference that is held yearly. It has been held in five different continents.
The conference seeks submissions on novel theoretical and practical results in:
access control |
accountability |
anonymity and pseudonymity |
applied cryptography |
authentication |
biometrics |
computer forensics |
critical infrastructure security |
cryptographic protocols |
database security |
data protection |
data/system integrity |
digital right management |
economics of security and privacy |
electronic frauds |
embedded security |
formal methods in security |
identity management |
information dissemination control |
information hiding & watermarking |
intrusion detection |
network security |
peer-to-peer security |
privacy |
secure group communications |
security in information flow |
security for Internet of Things |
security for mobile code |
secure cloud computing |
security in location services |
security modeling & architectures |
security and privacy in social networks |
security and privacy in pervasive and ubiquitous computing |
security of eCommerce, eBusiness and eGovernment |
security models for ambient intelligence environments |
trust models and trust policies |
As in all previous ISC editions, the proceedings will be published in the Springer Lecture Notes in Computer Science (LNCS) series. In this sense, all submissions are limited to 18 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length.
Each submission must be thoroughly anonymized, with no author names, affiliations, acknowledgements, or obvious references. Submissions must not duplicate work that was published elsewhere, or work that has been submitted in parallel to any other conference, journal or workshop that has proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference.
All submissions are eligible for the competitions for: