The 14th ISCISC conference

Conference Tracks

Foundations of cryptology

  • Foundation of cryptology
  • Symmetric cryptographic algorithms
  • Asymmetric and cryptographic algorithms and digital signatures
  • Hash functions
  • New methods in cryptography (post-quantum cryptography, functional cryptography, homomorphic cryptography, …
  • Information theoretic security

Implementation of cryptographic algorithms and related attacks

  • Software and hardware implementation of cryptographic algorithms
  • Side channel attacks and countermeasures
  • Embedded cryptographic systems
  • Hardware tampering and countermeasures
  • Cryptographic hardware accelerators
  • Verification and fault detection of implementations

Network security

  • Wireless and mobile network security
  • Security of network infrastructures
  • Security of network protocols and layers
  • Intrusion detection and prevention systems
  • Security of critical infrastructures

Cryptography and security protocols

  • Authentication and identification protocols
  • Anonymity, privacy and trust management
  • Cryptanalysis of security protocols
  • Trust and security models
  • Formal methods in information security

Security of computation

  • Security in computer architecture
  • Operating system security
  • Database security
  • Analysis of security and vulnerability of software and application programs
  • Security and privacy in mobile devices
  • Security of cloud computing
  • Access control

Security of data, systems and applications

  • Social engineering in security
  • Information security management system (ISMS)
  • Information security training
  • E-business and e-service security
  • E-health security
  • E-banking security
  • E-learning security

Information hiding

  • New algorithms in steganography and watermarking
  • Attack modeling and watermarking
  • Steganalysis
  • Applications of Information hiding

Digital forensics

  • Digital forensics methods
  • Database and network forensics
  • Fraud detection
  • Tamper detection and prevention
  • Malware and anti-malware analysis

Special topics of ISCISC2017 conference

  • Cyber security master plan for critical infrastructures (Electricity, Water, Oil & Gas, Transportation)
  • Common threats and vulnerabilities of industrial control systems
  • Cost analysis on security of industrial control systems
  • Native products for securing industrial control systems
  • Security architecture of industrial control systems
  • Security of SCADA systems
  • Standards and best practices in various industries
  • Other related topics
Language
Important Dates
Paper submission deadline:
May 18, 2017
May 22, 2017

Notification of acceptance:
August 08, 2017

Camera-ready papers due:
August 16, 2017
Sponsors