Call for Papers
Call for Papers
The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.
Types of Submissions Solicited
Papers on all technical aspects of information security and privacy are solicited for submission. Areas of interest include, but are not limited to:
|Access control||Email and web security||Privacy/anonymity, PETs|
|Applied cryptography||Future Internet security||Pervasive security|
|Automated security analysis||Identity management||Security in e-commerce|
|Biometric security/privacy||IP protection||Security in P2P systems|
|Complex systems security||Internet fraud, cybercrime||Security in grid systems|
|Critical infrastructures||Internet-of-Things security||Cloud security/privacy|
|Cryptographic primitives||Intrusion detection||Security/privacy metrics|
|Cryptographic protocols||Key management||Trust management|
|Data protection||Malware||Ubiquitous security/privacy|
|Database/system security||Mobile/wireless/5G security||Human factors in security|
|Digital rights management||Network security protocols||Usability in security/privacy|
Instructions for Authors
Submissions must be original work and may not be under submission to another venue at the time of review. Submissions are limited to 18 pages in the Springer Lecture Notes in Computer Science (LNCS) style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length.
Authors should consult Springer’s authors’ guidelines and use their proceedings templates, either for LaTeX or for Word, for the preparation of their papers. Springer encourages authors to include their ORCIDs in their papers. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form, through which the copyright for their paper is transferred to Springer. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made. Papers should be submitted through the ISC 2020 submision link.
Each submission must be thoroughly anonymized, with no author names, affiliations, acknowledgements, or obvious references. Submissions must not duplicate work that was published elsewhere, or work that has been submitted in parallel to any other conference, journal or workshop that has proceedings. At least one author of each accepted paper is required to physically present the submitted work at the conference, for the paper to be included in the proceedings.