Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2015. Topics of interest for IWSEC 2015 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops. In particular, we encourage the following topics in this year:
Critical Infrastructure Security
Cryptographic Protocols
Digital Forensics
Formal Methods
Privacy Preserving Data Mining
Real World Cryptography
Secure Multiparty Computation
Security Visualization
Software and System Security for Big Data
Instructions for Authors
Submitted papers must be original, unpublished, and not submitted to other conferences or journals for consideration for publication. Papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. They should be at most 16 pages long in total (including bibliography and appendices), in the standard LNCS format (except for author names and affiliations). Submissions to IWSEC 2015 should be submitted electronically in PDF format. A detailed description of the electronic submission procedure will be available at the workshop website. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. A part of papers may be accepted as short papers. At least one author of each accepted paper is required to register with the workshop until final version due, and is also required to present the paper in the conference. Note that, if your paper is accepted, the title and the author list in your submission cannot be changed when preparing the camera-ready version without the approval of the program co-chairs.
Proceedings
The proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series. The proceedings of previous IWSEC workshops, from IWSEC2006 to IWSEC2014, appeared as LNCS 4266, 4752, 5312, 5824, 6434, 7038, 7631, 8231 and 8639 respectively.
Best Paper Awards
Prizes will be awarded to the authors of the best paper(s) and the best student paper(s).
Social Event
IWSEC 2015 plans to have a social banquet and excursion. We will announce the details on the web page.
Download CFP
Conference scope
Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2015. Topics of interest for IWSEC 2015 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops. In particular, we encourage the following topics in this year:
Instructions for Authors
Proceedings
Best Paper Awards
Social Event