Call for Papers

Download CFP

CFP of IWSEC 2013 is available in TXT PDF.

Conference scope

Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2013. Topics of interest for IWSEC 2013 include but are not limited to:

  • Anonymity
  • Application Security
  • Authentication, Authorization and Access Control
  • Biometrics
  • Block/Stream Ciphers
  • Cloud Computing Security
  • Cryptographic Implementations and their Analysis
  • Cryptographic Protocols
  • Cryptanalysis
  • Data and System Integrity
  • Database Security
  • Digital Forensics
  • Digital Signatures
  • E-business/e-commerce/e-government Security
  • Hash Functions
  • Information Hiding
  • Information Law and Ethics
  • Intellectual Property Protection
  • Intrusion Prevention and Detection
  • Malware Prevention and Detection
  • Mobile System Security
  • Network Security
  • Privacy Preserving Systems
  • Public Key Cryptosystems
  • Quantum Security
  • Risk Analysis and Risk Management
  • Security Architectures
  • Security for Consumer Electronics
  • Security for Critical Infrastructures
  • Security Management
  • Secure Multiparty Computation
  • Security for Ubiquitous/Pervasive Computing
  • Smart Card and RFID Security
  • Software Security
  • System Security
  • Web Security

Instructions for Authors

Submitted papers must be original, unpublished, and not submitted to other conferences or journals for consideration for publication. Papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. They should be at most 16 pages long in total (including bibliography and appendices), in the standard LNCS format (except for author names and affiliations). Submissions to IWSEC 2013 should be submitted electronically in PDF format. A detailed description of the electronic submission procedure will available at the workshop website. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. At least one author of each accepted paper is required to register with the workshop and present the paper.


Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science series.

Best Paper Awards

Prizes will be awarded to the authors of the best paper(s) and the best student paper(s).

SpringerLink IEICE IPSJ