-
-
[分享]The 14th Information Security Conference (ISC 2011)
-
发表于: 2011-4-3 13:39 14746
-
The 14th Information Security Conference (ISC 2011) will be held in Xi’an, China. It will be sponsored by China Computer Federation (CCF) and co-organized by Xidian University.
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW'97, LNCS 1396), ISW 1999 in Malaysia (LNCS 1729), ISW 2000 in Australia (LNCS 1975) and then changed to the current name ISC when it was held in Spain in 2001 (ISC'01, LNCS 2200). The latest conferences were held in Brazil (ISC'02, LNCS 2433), UK (ISC'03, LNCS 2851), USA (ISC'04, LNCS 3225), Singapore (ISC'05, LNCS 3650), Greece (ISC'06, LNCS 4176), and Chile (ISC'07, LNCS 4779), Chinese Taipei(ISC'08, LNCS 5222), Italy (ISC'09, LNCS 5735), USA (ISC’10).
The conference seeks submissions from academia, industry, and government that present novel research on all theoretical and practical aspects of Information Security. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series. Topics of interest include, but are not limited to:
•access control
•accountability
•anonymity and pseudonymity
•applied cryptography
•authentication
•biometrics
•computer forensics
•cryptographic protocols
•database security
•data protection
•data/system integrity
•digital right management
•economics of security and privacy
•electronic frauds
•formal methods in security
•identity management
•information dissemination control
•information hiding and watermarking
•intrusion detection
•network security
•peer-to-peer security
•privacy
•secure group communications
•security and privacy in pervasive/ubiquitous computing
•security in information flow
•security in IT outsourcing
•security for mobile code
•secure cloud computing
•security of eCommerce, eBusiness and eGovernment
•security in location services
•security modeling and architectures
•security models for ambient intelligence environments
•security in social networks
•trust models and trust management policies
•embedded security
Important Dates
Paper submission deadline : May 10, 2011
Notification of acceptance: July 15, 2011
Proceedings version deadline :August 5, 2011
Instructions for authors
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions are limited to 16 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length. All submissions should be appropriately anonymized (i.e., should not contain author names or affiliations, or obvious citations).
Submissions must be made at the web page: http://www.easychair.org/conferences/?conf=isc2011 Only pdf submissions will be accepted. Submissions not meeting these guidelines risk rejection without review. At least one author of each accepted paper is required to register with the conference and present the paper. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series.
There will be a best paper award and a best student paper award. Any paper co-authored by a full-time student is eligible for both the best student paper award and the best paper award. Authors of selected papers will be invited to submit extended versions of their ISC'11 papers to a Special Issue of the ISI-ranked International Journal of Information Security (IJIS).
Downloads
•ISC 2011 Call For Papers (word)
•ISC 2011 Call For Papers (pdf)
Source from http://ste.xidian.edu.cn/isc2011/
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW'97, LNCS 1396), ISW 1999 in Malaysia (LNCS 1729), ISW 2000 in Australia (LNCS 1975) and then changed to the current name ISC when it was held in Spain in 2001 (ISC'01, LNCS 2200). The latest conferences were held in Brazil (ISC'02, LNCS 2433), UK (ISC'03, LNCS 2851), USA (ISC'04, LNCS 3225), Singapore (ISC'05, LNCS 3650), Greece (ISC'06, LNCS 4176), and Chile (ISC'07, LNCS 4779), Chinese Taipei(ISC'08, LNCS 5222), Italy (ISC'09, LNCS 5735), USA (ISC’10).
The conference seeks submissions from academia, industry, and government that present novel research on all theoretical and practical aspects of Information Security. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series. Topics of interest include, but are not limited to:
•access control
•accountability
•anonymity and pseudonymity
•applied cryptography
•authentication
•biometrics
•computer forensics
•cryptographic protocols
•database security
•data protection
•data/system integrity
•digital right management
•economics of security and privacy
•electronic frauds
•formal methods in security
•identity management
•information dissemination control
•information hiding and watermarking
•intrusion detection
•network security
•peer-to-peer security
•privacy
•secure group communications
•security and privacy in pervasive/ubiquitous computing
•security in information flow
•security in IT outsourcing
•security for mobile code
•secure cloud computing
•security of eCommerce, eBusiness and eGovernment
•security in location services
•security modeling and architectures
•security models for ambient intelligence environments
•security in social networks
•trust models and trust management policies
•embedded security
Important Dates
Paper submission deadline : May 10, 2011
Notification of acceptance: July 15, 2011
Proceedings version deadline :August 5, 2011
Instructions for authors
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions are limited to 16 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length. All submissions should be appropriately anonymized (i.e., should not contain author names or affiliations, or obvious citations).
Submissions must be made at the web page: http://www.easychair.org/conferences/?conf=isc2011 Only pdf submissions will be accepted. Submissions not meeting these guidelines risk rejection without review. At least one author of each accepted paper is required to register with the conference and present the paper. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series.
There will be a best paper award and a best student paper award. Any paper co-authored by a full-time student is eligible for both the best student paper award and the best paper award. Authors of selected papers will be invited to submit extended versions of their ISC'11 papers to a Special Issue of the ISI-ranked International Journal of Information Security (IJIS).
Downloads
•ISC 2011 Call For Papers (word)
•ISC 2011 Call For Papers (pdf)
Source from http://ste.xidian.edu.cn/isc2011/
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)
赞赏
他的文章
- [转帖][Cado-nfs-discuss] 795-bit factoring and discrete logarithms (RSA-240 于2019年12月2日被破解) 19498
- [转帖]How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits 8162
- [推荐]RSA-220 has 220 decimal digits (729 bits), and was factored 6895
- [推荐]RSA-210 has been factored. 11179
- Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks... 8923
看原图
赞赏
雪币:
留言: