IWSEC 2016

September 12 (Mon)-14 (Wed), 2016
Akihabara-Ochanomizu District, Tokyo, Japan

Call for Papers

Download CFP

CFP of IWSEC 2016 is available in PDF (longer ver., shorter ver.) and TXT.

Conference scope

Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2016. Topics of interest for IWSEC 2016 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops. In particular, we encourage the following topics in this year:

  • Big Data Analysis for Security
  • Critical Infrastructure Security
  • Cryptanalysis
  • Cryptographic Protocols
  • Cybersecurity Economics
  • Digital Forensics
  • Enriched Cryptography
  • Formal Methods
  • IoT security
  • Machine Learning for Security
  • Malware Countermeasures
  • Measurements for Cybersecurity
  • Multiparty Computation
  • Post Quantum Cryptography
  • Privacy Preserving
  • Real World Cryptography
  • Visualization for Security

Instructions for Authors

Submitted papers must be original, unpublished, and not submitted to other conferences or journals for consideration for publication. Papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. They should be at most 16 pages long in total (including bibliography and appendices), in the standard LNCS format (except for author names and affiliations). They should be submitted electronically in PDF format. Submissions not meeting the submission guidelines risk rejection without consideration of their merits. A part of papers may be accepted as short papers. At least one author of each accepted paper is required to register with the workshop until final version due, and is also required to present the paper in the conference. If no author registers or presents the paper, the paper will be rejected regardless of the reasons. Note that, if your paper is accepted, the title and the author list in your submission cannot be changed when preparing the final version without the approval of the program co-chairs.

Proceedings

The proceedings is planned to be published by Springer-Verlag in the Lecture Notes in Computer Science series. The proceedings of previous IWSEC workshops, from IWSEC2006 to IWSEC2015, appeared as LNCS 4266, 4752, 5312, 5824, 6434, 7038, 7631, 8231, 8639 and 9241 respectively.

Best Paper Awards

Prizes will be awarded to the authors of the best paper(s) and the best student paper(s).