Información de la conferencia
ISC 2025: Information Security Conference
https://isc25.skku.edu/
Día de Entrega:
2025-06-04
Fecha de Notificación:
2025-07-29
Fecha de Conferencia:
2025-10-20
Ubicación:
Seoul, South Korea
Años:
28
CCF: c   CORE: b   QUALIS: a2   Vistas: 47381   Seguidores: 106   Asistentes: 13

Solicitud de Artículos
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security.

This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.

Types of Submissions Solicited

Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:

access control	
formal methods	
post-quantum cryptography
anonymity	
foundations	
privacy
applied cryptography	
functional encryption	
privacy-enhancing technologies
attribute-based cryptography	
hardness assumptions	
protocols
automated security analysis	
homomorphic encryption	
public-key cryptography
biometric security	
identity-based cryptography	
real-world cryptography
blockchain	
identity management	
secure messaging
certification	
implementations	
secure voting
cloud computing	
indistinguishability obfuscation	
security proofs
containerization	
Internet security	
side-channel attacks
critical infrastructures	
intrusion detection	
software security
cryptanalysis	
key management	
standardization
cryptocurrency	
malware	
symmetric-key cryptography
cybercrime	
mathematical aspects	
threshold cryptography
database/system security	
micro-architectural attacks	
trusted execution
decentralized systems	
mobile/wireless/5G security	
unlinkability
downgrade attacks	
multilinear maps	
usability
embedded platforms	
multi-party computation	
vulnerabilities
fault attacks	
networks security	
web security
fingerprinting	
OS and systems security	
zero-knowledge proofs
Última Actualización Por Dou Sun en 2025-05-26
Coeficiente de Aceptación
AñoEnviadosAceptadosAceptados(%)
20141063634%
2013703042.9%
2012722331.9%
2011952526.3%
20101173630.8%
20091053836.2%
20081343324.6%
20071162824.1%
20061883820.2%
20052713814%
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
baa1ICALPInternational Colloquium on Automata, Languages and Programming2025-02-072025-04-142025-07-08
ICSIPInternational Conference on Signal and Image Processing2025-06-102025-06-202025-07-12
MulGraBInternational Conference on Multimedia, Computer Graphics and Broadcasting2015-06-302015-07-152015-11-25
ICT4AWEInternational Conference on Information and Communication Technologies for Ageing Well and e-Health2015-12-072016-02-012016-04-21
ccb1MMMInternational Conference on MultiMedia Modeling2025-08-192025-10-092026-01-29
RoboComInternational Workshop on Communication and Networking for Swarms Robotics2024-10-062024-10-212025-01-10
WoTBDInternational Symposium on Web of Things and Big Data2015-08-302015-09-152015-10-06
BIBCInternational Conference on Big Data, IOT and Blockchain2022-08-272022-09-102022-09-17
cba1ICIPInternational Conference on Image Processing2025-01-222025-05-202025-09-14
ICRCCInternational Conference on Radar, Communication and Computing2016-09-152016-09-202016-08-13
Revistas Relacionadas
CCFNombre CompletoFactor de ImpactoEditorISSN
bIEEE Transactions on VLSI Systems2.800IEEE1063-8210
International Journal of Distributed Sensor NetworksHindawi1550-1329
IEEE Control Systems Letters2.400IEEE2475-1456
VLSI DesignHindawi1065-514X
Computational Statistics1.000Springer0943-4062
bUser Modeling and User-Adapted Interaction3.000Springer0924-1868
bComputer Supported Cooperative Work2.000Springer0925-9724
Journal of Digital Imaging2.900Springer0897-1889
Software Testing Verification and Reliability1.500Wiley-Blackwell0960-0833