Original papers on the research and development of various security topics,
as well as case studies and implementation experiences, are solicited for
submission to IWSEC 2014. Topics of interest for IWSEC 2014 include but are
not limited to:
Anonymity
Application Security
Authentication, Authorization and Access Control
Biometrics
Block/Stream Ciphers
Cloud Computing Security
Cryptographic Implementations and their Analysis
Cryptographic Protocols
Cryptanalysis
Data and System Integrity
Database Security
Digital Forensics
Digital Signatures
E-business/e-commerce/e-government Security
Hash Functions
Information Hiding
Information Law and Ethics
Intellectual Property Protection
Intrusion Prevention and Detection
Malware Prevention and Detection
Mobile System Security
Network Security
Privacy Preserving Systems
Public Key Cryptosystems
Quantum Security
Risk Analysis and Risk Management
Security Architectures
Security for Consumer Electronics
Security for Critical Infrastructures
Security Management
Secure Multiparty Computation
Security for Ubiquitous/Pervasive Computing
Smart Card and RFID Security
Software Security
System Security
Web Security
Instructions for Authors
Submitted papers must be original, unpublished, and not submitted to other
conferences or journals for consideration for publication. Papers must be
written in English and be fully anonymous with no author names, affiliations,
acknowledgements, or obvious references. They should be at most 16 pages long
in total (including bibliography and appendices), in the standard LNCS format
(except for author names and affiliations). Submissions to IWSEC 2014 should
be submitted electronically in PDF format. A detailed description of the
electronic submission procedure will available at the workshop website.
Submissions not meeting the submission guidelines risk rejection without
consideration of their merits. At least one author of each accepted paper is
required to register with the workshop and present the paper.
Proceedings
Proceedings will be published in Springer-Verlag's Lecture Notes in Computer
Science series.
Best Paper Awards
Prizes will be awarded to the authors of the best paper(s) and the best
student paper(s).
Poster Session
IWSEC2014 will have a poster session. For further information, please see Call for Posters page.
Download CFP
Conference scope
Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2014. Topics of interest for IWSEC 2014 include but are not limited to:
Instructions for Authors
Proceedings
Best Paper Awards
Poster Session