Conference Information
ISC 2025: Information Security Conference
https://isc25.skku.edu/Submission Date: |
2025-06-04 |
Notification Date: |
2025-07-29 |
Conference Date: |
2025-10-20 |
Location: |
Seoul, South Korea |
Years: |
28 |
CCF: c CORE: b QUALIS: a2 Viewed: 54137 Tracked: 106 Attend: 13
Call For Papers
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications. Types of Submissions Solicited Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to: access control formal methods post-quantum cryptography anonymity foundations privacy applied cryptography functional encryption privacy-enhancing technologies attribute-based cryptography hardness assumptions protocols automated security analysis homomorphic encryption public-key cryptography biometric security identity-based cryptography real-world cryptography blockchain identity management secure messaging certification implementations secure voting cloud computing indistinguishability obfuscation security proofs containerization Internet security side-channel attacks critical infrastructures intrusion detection software security cryptanalysis key management standardization cryptocurrency malware symmetric-key cryptography cybercrime mathematical aspects threshold cryptography database/system security micro-architectural attacks trusted execution decentralized systems mobile/wireless/5G security unlinkability downgrade attacks multilinear maps usability embedded platforms multi-party computation vulnerabilities fault attacks networks security web security fingerprinting OS and systems security zero-knowledge proofs
Last updated by Dou Sun in 2025-05-26
Acceptance Ratio
| Year | Submitted | Accepted | Accepted(%) |
|---|---|---|---|
| 2014 | 106 | 36 | 34% |
| 2013 | 70 | 30 | 42.9% |
| 2012 | 72 | 23 | 31.9% |
| 2011 | 95 | 25 | 26.3% |
| 2010 | 117 | 36 | 30.8% |
| 2009 | 105 | 38 | 36.2% |
| 2008 | 134 | 33 | 24.6% |
| 2007 | 116 | 28 | 24.1% |
| 2006 | 188 | 38 | 20.2% |
| 2005 | 271 | 38 | 14% |
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2025-08-10 | 2025-10-03 | 2025-12-16 | |
| c | INSCRYPT | International Conference on Information Security and Cryptology | 2025-06-15 | 2025-08-01 | 2025-10-19 | ||
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | b | b1 | ICICS | International Conference on Information and Communications Security | 2025-05-23 | 2025-07-21 | 2025-10-29 |
| c | b1 | FUSION | International Conference on Information Fusion | 2024-03-01 | 2024-05-01 | 2024-07-07 | |
| b | b1 | ISIT | International Symposium on Information Theory | 2019-01-20 | 2019-03-31 | 2019-07-07 | |
| c | ISA' | International Conference on Information Security and Assurance | 2016-01-30 | 2016-02-15 | 2016-03-24 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 | ||
| b | ITW | Information Theory Workshop | 2013-07-12 | 2013-09-09 |
| Short | Full Name | Conference |
|---|---|---|
| ICISS | International Conference on Information Systems Security | 2025-12-16 |
| INSCRYPT | International Conference on Information Security and Cryptology | 2025-10-19 |
| ISC | Information Security Conference | 2025-10-20 |
| ICICS | International Conference on Information and Communications Security | 2025-10-29 |
| FUSION | International Conference on Information Fusion | 2024-07-07 |
| ISIT | International Symposium on Information Theory | 2019-07-07 |
| ISA' | International Conference on Information Security and Assurance | 2016-03-24 |
| IAS | International Conference on Information Assurance and Security | 2015-12-07 |
| ICISC | International Conference on Information Security and Cryptology | 2015-11-25 |
| ITW | Information Theory Workshop | 2013-09-09 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| The Information Society | 3.0 | Taylor & Francis | 0197-2243 | |
| a | IEEE Transactions on Information Theory | 2.9 | IEEE | 0018-9448 |
| International Journal of Information Security | 2.400 | Springer | 1615-5262 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| Journal of Information Science | 1.800 | SAGE | 0165-5515 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| Information Polity | 1.300 | IOS Press | 1570-1255 | |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| IEEE Transactions on Information Forensics and Security | 8.0 | IEEE |
| Journal of Information Security and Applications | 3.7 | Elsevier |
| The Information Society | 3.0 | Taylor & Francis |
| IEEE Transactions on Information Theory | 2.9 | IEEE |
| International Journal of Information Security | 2.400 | Springer |
| EURASIP Journal on Information Security | 2.1 | Springer |
| Journal of Information Science | 1.800 | SAGE |
| IET Information Security | 1.300 | IET |
| Information Polity | 1.300 | IOS Press |
| International Journal of Information Security and Privacy | 0.800 | Idea Group Inc |