IMPORTANT DATES

Workshop proposal deadline: May 10, 2013
Paper submission deadline: June 10 August 20 August 22, 2013 at 4pm GMT
Acceptance notification: August 20 October 21, 2013
Final versions of accepted papers due: September 3 TBA
Early registration deadline: November 1, 2013
Conference dates: November 13-15, 2013
Post-proceeding version: January 17, 2014

HOME

The 16th Information Security Conference (ISC 2013) will be held in Dallas, Texas from November 13-15. It will be organized by The University of Texas at Dallas. The conference time and place puts it immediately after GameSec 2013 in the same metroplex (Dallas-Fort Worth). This is a wonderful opportunity to attend two excellent security conferences in one trip!

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security. It was first initiated as a workshop in Japan in 1997 (ISW'97, LNCS 1396), Malaysia (ISW'99, LNCS 1729), and Australia (ISW'00, LNCS 1975), and then changed to the current name ISC when it was held in Spain in 2001 (ISC'01, LNCS 2200). Later conferences were held in Brazil (ISC'02, LNCS 2433), UK (ISC'03, LNCS 2851), USA (ISC'04, LNCS 3225), Singapore (ISC'05, LNCS 3650), Greece (ISC'06, LNCS 4176), Chile (ISC'07, LNCS 4779), Chinese Taipei (ISC'08, LNCS 5222), Italy (ISC'09, LNCS 5735), Florida USA (ISC'10, LNCS 6531), China (ISC'11, LNCS 7001), and Germany (ISC'12, LNCS 7483).

The conference seeks submissions from academia, industry, and government that present novel research on all theoretical and practical aspects of Information Security. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series. Topics of interest include, but are not limited to:

  • access control
  • accountability
  • anonymity and pseudonymity
  • applied cryptography
  • authentication
  • biometrics
  • computer forensics
  • cryptographic protocols
  • database security
  • data protection
  • data/system integrity
  • digital right management
  • economics of security and privacy
  • electronic frauds
  • formal methods in security
  • identity management
  • information dissemination control
  • information hiding and watermarking
  • intrusion detection
  • network security
  • peer-to-peer security
  • privacy
  • secure group communications
  • security and privacy in pervasive/ubiquitous computing
  • security in information flow
  • security in IT outsourcing
  • security for mobile code
  • secure cloud computing
  • security of eCommerce, eBusiness and eGovernment
  • security in location services
  • security modeling and architectures
  • security models for ambient intelligence environments
  • security in social networks
  • trust models and trust management policies
  • embedded security