Co-organized by IEICE & IPSJ

Call for Papers

Paper Submission

Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration of publication. Papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements or obvious references. They should be at the maximum of 16 pages in total, in standard LNCS format (except for author names and affiliations). For review purposes only a PDF manuscript file in preprint format will be accepted. When special font is used, it must be embedded in the manuscript file. If you have any problem in preparing the PDF file, please contact us. Papers should be sufficiently intelligible and self contained without appendices so that PC members can review papers without them.

Accepted papers will be presented at the workshop and published in the book of proceedings. At least one author of each accepted paper is required to register and participate in the workshop in Nara to present the paper. Proceedings will be published in a special volume of Springer LNCS (Lecture Notes in Computer Science).

Papers must be submitted in electronic form through the web. Submissions not meeting the submission guidelines risk rejection without consideration of their merits.


Prizes will be awarded to both the author of the best student paper and the author of the best paper.
Student authors are eligible if:
*they are full-time students at the time of submission and presentation,
*they should give an oral presentation at IWSEC2007, and
*they should contribute actively to resolve a problem in the paper.
This should be indicated when the camera-ready paper is submitted. All papers that are not indicated as the best-student-award candidate are eligible for the best paper award.

Download CFP

CFP of IWSEC2007 (PDF) is available.(update April 16, 2007)

Preliminary announcement of IWSEC2007 (PDF) is available.


Papers offering novel research contributions in any aspect of computer security are solicited for submission to the IWSEC2007. Papers may present theory, applications or practical experiences on topics including, but not limited to:

  • Fundamental Tools for Information Security
    • Authentication
    • Authorization and access control
    • Biometrics
    • Cryptography and itsapplications
    • Data protection
    • Digital signatures
    • Information hiding
    • Quantum security
  • Network and Distributed Systems Security
    • Distributed systems security
    • Internet and web security
    • Intrusion detection
    • Security in sensor networks
    • Mobile security
    • Key management
    • Public key infrastructure
  • Privacy Enhancing Technology
    • Anonymity related technology
    • Privacy preserving system
    • Privacy on WEB and DB
  • Secure Living and Working Environments
    • Secure ubiquitous computing
    • Secure consumer electronics
    • Secure office
    • RFID security
    • ITS security
  • Security in Commerce and Government
    • DRM, copyright protection, and content security
    • e-business/e-commerce security
    • Secure e-government
  • Security Management
    • Access control policies
    • ISMS
  • Software and System Security
    • Security architectures
    • Secure information systems development
    • Data and system integrity
    • Efficient representations and implementations
  • Protection of Critical Infrastructures
    • Information warfare and critical infrastructure protection
    • Risk analysis and risk management
  • Testing, Verification and Certification
    • Security verification
    • Assurance
  • Law, Policy, Ethics and Related Technologies
    • Computer forensics
    • Information law, ethics
    • Enterprise security models and policies