-------- Forwarded Message -------- Subject: [WI] CfP Int. Workshop on Security (IWSEC) 2019, Tokyo, JP Date: Thu, 28 Feb 2019 04:57:10 +0000 From: WohlgemuthSven / WOHLGEMUTH,SVEN sven.wohlgemuth.kd@hitachi.com Reply-To: WohlgemuthSven / WOHLGEMUTH,SVEN sven.wohlgemuth.kd@hitachi.com To: wi@aifb.uni-karlsruhe.de wi@aifb.uni-karlsruhe.de
IWSEC 2019 - CALL FOR PAPERS
The 14th International Workshop on Security, IWSEC 2019, calls for papers.
Date: August 28 (Wed) - 30 (Fri), 2019
Venue: Tokyo Institute of Technology, Tokyo, Japan
IWSEC 2019 in the web: https://www.iwsec.org/2019/
Submission page: https://www.iwsec.org/2019/submission.html
Important Dates:
Submission deadline: March 15, 2019
Notification of decision: May 15, 2019
Camera-ready version: June 3, 2019
General Co-Chairs:
Shiho Moriai (National Institute of Information and Communications Technology, Japan)
Toshihiro Yamauchi (Okayama University, Japan)
Program Co-Chairs:
Nuttapong Attrapadung (National Institute of Advanced Industrial Science and Technology, Japan)
Takeshi Yagi (NTT Security (Japan) KK, Japan)
Best Paper Awards:
Prizes will be awarded to the authors of the best paper(s) and the best student paper(s).
Journal Recommendation:
It is planned that Program Co-Chairs will recommend the authors of best papers to submit their full versions to either of the CSEC or ISEC journals after consultation between Program Co-Chairs and the authors.
Proceedings:
The conference proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.
Banquet:
It is planned that IWSEC 2019 banquet will be held at a Tokyo bay cruising restaurant.
Conference scope:
Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2019. Topics of interest for IWSEC 2019 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops.
This year IWSEC categorizes topics of interests into the following two tracks:
A : Cryptography Track
Applied cryptography
Biometrics security and privacy
Blockchain and cryptocurrency
Cryptanalysis
Cryptographic primitives
Cryptographic protocols
Financial cryptography
Formal methods for security analysis
Multiparty computation
Post-quantum cryptography
Privacy-preserving data mining
Public-key cryptography
Real-world cryptographic systems
Security/privacy for machine learning
Symmetric-key cryptography
B : Cybersecurity and Privacy Track
Attacks and defenses
Cyber physical systems security
Forensics
Hardware security
Internet-of-Things security
Intrusion detection and prevention
Law and ethic cybersecurity
Machine learning for cybersecurity
Malware analysis
Measurements for cybersecurity
Mobile and web security
Network, system and cloud security
Privacy-enhancing technologies
Program analysis
Usable security and privacy
IWSEC 2019 CfP: https://www.iwsec.org/2019/cfp.html https://www.iwsec.org/2019/cfp.html
Tweets @iwsec : https://twitter.com/iwsec
-- Mailing-Liste: wi@lists.kit.edu Administrator: wi-request@lists.kit.edu Konfiguration: https://www.lists.kit.edu/wws/info/wi