Information Security Conference (ISC 2015)

September 9-11, 2015 | Trondheim, Norway

Call for Papers LNCS logo

PDF version

The Information Security Conference (ISC), which started as a workshop (ISW) in 1997, is a well-established and highly reputable international conference that is held yearly. It has been held in five different continents.

Important dates

The conference seeks submissions on novel theoretical and practical results in:

access control
anonymity and pseudonymity
applied cryptography
computer forensics
critical infrastructure security
cryptographic protocols
database security
data protection
data/system integrity
digital right management
economics of security and privacy
electronic frauds
embedded security
formal methods in security
identity management
information dissemination control
information hiding & watermarking
intrusion detection
network security
peer-to-peer security
secure group communications
security in information flow
security for Internet of Things
security for mobile code
secure cloud computing
security in location services
security modeling & architectures
security and privacy in social networks
security and privacy in pervasive and ubiquitous computing
security of eCommerce, eBusiness and eGovernment
security models for ambient intelligence environments
trust models and trust policies

Instructions for paper submission

As in all previous ISC editions, the proceedings will be published in the Springer Lecture Notes in Computer Science (LNCS) series. In this sense, all submissions are limited to 18 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length.

Each submission must be thoroughly anonymized, with no author names, affiliations, acknowledgements, or obvious references. Submissions must not duplicate work that was published elsewhere, or work that has been submitted in parallel to any other conference, journal or workshop that has proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference.

All submissions are eligible for the competitions for:

(We reserve the right not to give an award.)