--------------------------------------------------------- IWSEC is the security workshop originated in Japan. This year's IWSEC (IWSEC 2010) will be held in Kobe, Japan on November 22-24, 2010. Proceedings will be published from the Springer's LNCS series. IWSEC 2010 consists of the following 3 tracks: Track I : Foundations of Security Track II : Security in Networks and Ubiquitous Computing Systems Track III: Security in Real Life Applications Track III, a new track from this year, focuses on practical applications on the real life. The submission deadline is May 10, 2010. The submission server is ready to welcome your submissions. --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- IWSEC 2010 Call for Papers The 5th International Workshop on Security (IWSEC 2010) November 22-24, 2010 Kobe International Conference Center, Kobe, Japan Web Page: http://www.iwsec.org/2010/ Contact: iwsec2010@iwsec.org Jointly organized by ISEC and CSEC [Important Dates] * Submission of papers (Extended): May 10, 2010 JST (UTC + 9hr) * Notification to authors: July 14, 2010 JST (UTC + 9hr) [Overview] IWSEC 2010 will select submissions from three tracks, and the review and selection processes of these tracks will be independent of each other. Track III (security in real life applications) is a new track designed to allow researchers and practitioners to share their research and experience. We welcome papers that highlight the practical aspects of security technologies and industrial case studies. Topics of interest for the conference include but are not limited to: Track I: Foundations of Security] (Track Chair: Noboru Kunihiro, The University of Tokyo, Japan) * Authentication * Biometrics * Block/Stream Ciphers * Cryptographic Protocols * Cryptanalysis * Digital Signatures * Hash Functions * Information Hiding * Public Key Cryptosystems * Quantum Security Track II: Security in Networks and Ubiquitous Computing Systems (Track Chair: Isao Echizen, National Institute of Informatics, Japan) * Network Security - Intrusion Detection - Malware Detection - Security in Sensor Networks * Security of Ubiquitous and Cloud Computing - Security of Multi-party Computing - Authorization and Access Control - Mobile Security * Privacy Enhancing Technology - Anonymity-related Technology - Privacy Preserving System - Privacy on WEB and DB * Software Security - Security Architectures - Data and System Integrity - Reliable Secure Interactions of Services Track III: Security in Real Life Applications (Track Chair: Ryoichi Sasaki, Tokyo Denki University, Japan) * Secure Living and Working Environments - Secure Consumer Electronics - RFID Security * Security in Commerce and Government - DRM, Copyright Protection, and Content Security E-business/e-commerce/e-government Security * Security Management - Access Control Policies and ISMS - Business Processes Security * Protection of Critical Infrastructures - Critical Infrastructure Protection - Risk Analysis and Risk Management * Testing, Verification and Certification - Security Verification - Assurance * Law, Policy, Ethics and Related Technologies - Digital Forensics - Information Law and Ethics [Instructions for Authors] Submitted papers must be original, unpublished, and not submitted to other conferences or journals for consideration for publication. Papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references. They should be at most 16 pages long in total, in standard LNCS format except for author names and affiliations. Papers should be sufficiently intelligible and self-contained without appendices so that PC members can review papers without them. Accepted full papers will be presented at the workshop and will be published in the LNCS conference proceedings series. Papers accepted as short papers will also be presented at the workshop and will be published in the locally printed proceedings with an official ISBN number. At least one author of each accepted paper is required to register with the workshop and present the paper. Each paper can be submitted to one of the three tracks. The review and selection processes will be done according to the policy of the track. For instance, Track III emphasizes the practicability of the technology. [Best Paper Awards] Prizes will be awarded to the authors of the best paper(s) and the best student paper(s). [Committees] General Chairs: Hiroaki Kikuchi (Tokai University, Japan) Toru Fujiwara (Osaka University, Japan) Program Chairs: Isao Echizen (National Institute of Informatics, Japan) Noboru Kunihiro (The University of Tokyo, Japan) Ryoichi Sasaki (Tokyo Denki University, Japan) Program Committee: Track I: Foundations of Security (Track Chair: Noboru Kunihiro, The University of Tokyo, Japan) Zhenfu Cao, Shanghai Jiao Tong University, China Eiichiro Fujisaki, NTT, Japan Aggelos Kiayias, University of Athens, Greece Tetsu Iwata, Nagoya University, Japan Alfred Menezes, University of Waterloo, Canada Phong Nguyen, INRIA and ENS, France Kazuo Ohta, The University of Electro-Communications, Japan Raphael Phan, Loughborough University, UK Bart Preneel, Katholieke Universiteit Leuven, Belgium Christian Rechberger, Katholieke Universiteit Leuven, Belgium Rei Safavi-Naini, University of Calgary, Canada Palash Sarkar, Indian Statistical Institute, India Willy Susilo, University of Wollongong, Australia Tsuyoshi Takagi, Future University of Hakodate, Japan Routo Terada, University of Sao Paulo, Brasil Sung-Ming Yen, National Central University, Taiwan Yuliang Zheng, University of North Carolina, USA Track II: Security in Networks and Ubiquitous Computing Systems (Track Chair: Isao Echizen, National Institute of Informatics, Japan) Liqun Chen, HP Laboratories, UK Bart De Decker, K.U.Leuven, Belgium William Enck, Pennsylvania State University, USA Dieter Gollmann, Hamburg University of Technology, Germany Yoshiaki Hori, Kyushu University, Japan Angelos D. Keromytis, Columbia University, USA Seungjoo Kim, Sungkyunkwan University, Korea Kwok-Yan Lam, Tsinghua University, China Joseph Liu, Institute for Infocomm Research, Singapore Javier Lopez, University of Malaga, Spain Kyung-Hyune Rhee, Pukyong National University, Korea Ahamd-Reza Sadeghi, Ruhr-Universitat Bochum, Germany Keisuke Takemori, KDDI Corporation, Japan Sven Wohlgemuth, National Institute of Informatics, Japan Toshihiro Yamauchi, Okayama University, Japan Hiroshi Yoshiura, University of Electro-Communications, Japan Alf Zugenmaier, DOCOMO Euro-Labs, Germany Track III: Security in Real Life Applications (Track Chair: Ryoichi Sasaki, Tokyo Denki University, Japan) Rafael Accorsi, University of Freiburg, Germany Claudio Ardagna, Universita degli Studi di Milano, Italy Kevin Butler, Pennsylvania State University, USA Pau-Chen Cheng, IBM Thomas J Watson Research Center, USA Steven Furnell, University of Plymouth, UK Jongsung Kim, Kyungnam Universtiy, Korea Tetsutaro Kobayashi, NTT, Japan Jigang Liu, Metropolitan State University, USA Masakatsu Nishigaki, Shizuoka University, Japan Hartmut Pohl, University of Applied Sciences Bonn-Rhein-Sieg, Germany Kai RannenbergCGoethe University Frankfurt, Germany Sujeet Shenoi, University of Tulsa, USA Reima Suomi, Turku School of Economics, Finland Mikiya Tani, NEC, Japan Ryuya Uda, Tokyo University of Technology, Japan Sabrina De Capitani di Vimercati, University of Milan, Italy Guilin Wang, University of Birmingham, UK (Last Update: April 30, 2010) --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * --- * ---