Co-organized by IEICE & IPSJ

IWSEC2011

The 6th International Workshop on Security, IWSEC2011, was held at Institute of Industrial Science, the University of Tokyo, Japan, between 8-10 November, 2011. The proceedings were published as the Springer LNCS (Lecture Notes in Computer Science) volume entitled "Advances in Information and Computer Security".


Best Paper Award

Georgios Portokalidis and Angelos D. Keromytis, "REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points"

Best Student Paper Award

S. Sharmila Deva Selvi, S. Sree Vivek, and C. Pandu Rangan, "Identity Based Deterministic Signature Scheme Without Forking-Lemma"

Conference topics

Original papers on the research and development of various security topics are solicited for submission to IWSEC 2011. Topics of interest for IWSEC 2011 include but are not limited to:


  • Foundations of Security
    • Authentication
    • Biometrics
    • Block/Stream Ciphers
    • Cryptographic Protocols
    • Cryptanalysis
    • Digital Signatures
    • Hash Functions
    • Information Hiding
    • Public Key Cryptosystems
    • Quantum Security
  • Security in Networks and Ubiquitous Computing Systems
    • Network Security
      • Intrusion Detection
      • Malware Detection
      • Security in Sensor Networks
    • Security of Ubiquitous and Cloud Computing
      • Security of Multi-party Computing
      • Authorization and Access Control
      • Mobile Security
    • Privacy Enhancing Technology
      • Anonymity-related Technology
      • Privacy Preserving System
      • Privacy on WEB and DB
    • Software Security
      • Security Architectures
      • Data and System Integrity
      • Reliable Secure Interactions of Services
  • Security in Real Life Applications
    • Secure Living and Working Environments
      • Secure Consumer Electronics
      • RFID Security
    • Security in Commerce and Government
      • DRM
      • Copyright Protection
      • Content Security E-business/e-commerce/e-government Security
    • Security Management
      • Access Control Policies and ISMS
      • Business Processes Security
    • Protection of Critical Infrastructures
      • Critical Infrastructure Protection
      • Risk Analysis and Risk Management
    • Testing, Verification and Certification
      • Security Verification
      • Assurance
    • Law, Policy, Ethics and Related Technologies
      • Digital Forensics
      • Information Law and Ethics