IWSEC 2018

3 September (Mon) - 5 September (Wed), 2018
Sendai, Miyagi, Japan

Call for Papers

Download CFP

CFP of IWSEC 2018 is available in PDF .

Conference scope

Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2018. Topics of interest for IWSEC 2018 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops. In particular, we encourage the following topics this year:

  • Big Data Analysis for Security
  • Critical Infrastructure Security
  • Cryptanalysis
  • Cryptographic Protocols
  • Cybersecurity Economics
  • Digital Forensics
  • Enriched Cryptography
  • Financial Security
  • Formal Methods
  • Information Law and Ethics
  • IoT security
  • Machine Learning for Security
  • Malware Countermeasures
  • Measurements for Cybersecurity
  • Multiparty Computation
  • Post Quantum Cryptography
  • Privacy Preserving
  • Rational Cryptography
  • Real World Cryptography
  • Security Management
  • Visualization for Security

Instructions for Authors

Submitted papers must be original, unpublished, and not submitted in parallel to any other peer-reviewed conferences or journals in consideration for publication. Papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. They should be in the standard LNCS format (except for author names and affiliations---remember submissions must be ANONYMOUS) and at most 16 pages long in total including appendices and bibliography. Note that appendices need to come in front of bibliography according to the latest LNCS format. Papers should be submitted electronically in PDF format. Submissions not meeting these guidelines risk rejection without consideration of their merit. Some papers may be accepted as short papers. Papers may be accepted and merged with another accepted paper. Papers may be conditionally accepted for shepherding. After a paper is accepted, at least one of the authors of the paper must register with the workshop before the due date of the camera-ready version and is also required to present the paper in the workshop. In the event no author registers with the workshop or no author participates in the workshop, the paper will be rejected regardless of the reason. The title and the list of authors of the final version cannot be changed from its submission unless otherwise approved by the Program Co-Chairs.
All contents beyond 16 pages or appearing after the bibliography are regarded as supplementary material. Reviewers are not required to read any supplementary material. Supplementary material is only informational, and submissions should be intelligible and complete without it. Supplementary material must not remain in the camera-ready version.

Important Dates

  • Submission deadline: March 23, 2018 (23:59 UTC) April 2, 2018 (23:59 UTC) [extended]
  • Notification of decision: May 23, 2018 (23:59 UTC)
  • Camera-ready version due: June 13, 2018 (23:59 UTC)

Best Paper Awards

Prizes will be awarded to the authors of the best paper(s) and the best student paper(s).

Journal Recommendation

It is planned that Program Co-Chairs will recommend that the authors of best papers submit their full versions to either of the CSEC or ISEC journals after consultation between Program Co-Chairs and the authors.

Proceedings

The proceedings is planned to be published by Springe in the Lecture Notes in Computer Science series.