IWSEC 2019 - CALL FOR PAPERS


The 14th International Workshop on Security - IWSEC - 2019 calls for papers.

Date: August 28 (Wed) - 30 (Fri), 2019

Venue: Tokyo Institute of Technology, Tokyo, Japan



IWSEC 2019 in the web: https://www.iwsec.org/2019/

Submission page: https://www.iwsec.org/2019/submission.html



Important Dates:

Submission deadline: March 15, 2019

Notification of decision: May 15, 2019

Camera-ready version: June 3, 2019



General Co-Chairs:

    Shiho Moriai (National Institute of Information and Communications 
Technology, Japan)

    Toshihiro Yamauchi (Okayama University, Japan)



Program Co-Chairs:

    Nuttapong Attrapadung (National Institute of Advanced Industrial Science 
and Technology, Japan)

    Takeshi Yagi (NTT Security (Japan) KK, Japan)



Best Paper Awards:

 Prizes will be awarded to the authors of the best paper(s) and the best 
student paper(s).



Journal Recommendation:

 It is planned that Program Co-Chairs will recommend the authors of best papers 
to submit their full versions to either of the CSEC or ISEC journals after 
consultation between Program Co-Chairs and the authors.



Proceedings:

 The conference proceedings will be published by Springer in the Lecture Notes 
in Computer Science (LNCS) series.



Banquet:

 It is planned that IWSEC 2019 banquet will be held at a Tokyo bay cruising 
restaurant.



Conference scope:

Original papers on the research and development of various security topics, as 
well as case studies and implementation experiences, are solicited for 
submission to IWSEC 2019. Topics of interest for IWSEC 2019 include all theory 
and practice of cryptography, information security, and network security, as in 
previous IWSEC workshops.



This year IWSEC categorizes topics of interests into the following two tracks:



A : Cryptography Track

Applied cryptography

Biometrics security and privacy

Blockchain and cryptocurrency

Cryptanalysis

Cryptographic primitives

Cryptographic protocols

Financial cryptography

Formal methods for security analysis

Multiparty computation

Post-quantum cryptography

Privacy-preserving data mining

Public-key cryptography

Real-world cryptographic systems

Security/privacy for machine learning

Symmetric-key cryptography



B : Cybersecurity and Privacy Track

Attacks and defenses

Cyber physical systems security

Forensics

Hardware security

Internet-of-Things security

Intrusion detection and prevention

Law and ethic cybersecurity

Machine learning for cybersecurity

Malware analysis

Measurements for cybersecurity

Mobile and web security

Network, system and cloud security

Privacy-enhancing technologies

Program analysis

Usable security and privacy



IWSEC 2019 CfP: https://www.iwsec.org/2019/cfp.html

Tweets @iwsec : https://twitter.com/iwsec










-- 
Liberationtech is public & archives are searchable from any major commercial 
search engine. Violations of list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest mode, or change password by emailing 
liberationtech-ow...@lists.stanford.edu.

Reply via email to