The following Call for Papers is downloadable in PDF format or raw text format.

Background: The Information Security Conference (ISC), which started as a workshop (ISW) in 1997, is an international conference organized yearly. It has been held in 5 different continents. Its proceedings have been published by Springer.

Topics of interest: The conference seeks submissions on novel theoretical and practical results on, or on Information Security aspects of:

  • access control
  • anonymity
  • authentication
  • biometrics
  • cloud computing
  • cryptography
  • database security
  • digital right management
  • dissemination control
  • eBusiness
  • eCommerce
  • eGovernment
  • economic aspects
  • embedded systems
  • fingerprinting
  • formal methods
  • hardware
  • identity management
  • incident response
  • insider threats
  • intrusion detection
  • key management
  • location services
  • malware
  • mobile code aspects
  • network security
  • operating system
  • outsourcing IT
  • pervasive computing
  • predicting malware
  • privacy
  • social networks
  • software security
  • trust management
  • trust models
  • user-friendliness
  • e-voting
  • watermarking
  • web security

Papers on other topics on Information Security are also welcome. ISC has attracted papers from famous international authors in the area.

Important dates: May 10: Workshop proposal deadline
June 10 August 20 August 22 at 4pm GMT: Deadline for submission of papers
August 20 October 21: Notification of authors
September 3 TBA: Final versions of papers
January 17, 2014: Post-Proceeding Version

Submission instructions: Please see the submission instructions page.

Program Chair: Yvo Desmedt, General Chair: Bhavani Thuraisingham, and Local Chair: Kevin Hamlen

New Topic of Interest: Predicting Malware

Introduction: Cohen with his virus paper predicted new malware. The viruses that follwed and the anti-virus software showed its importance. Although in the 1980s scientists and also the makers of WarGames predicted attacks against critical infrastructures, it took until the deployment of the Stuxnet worm before it was taken seriously. Banks wait to deploy security mechanisms against attack vectors until the harm done by hackers make them economically justifiable, showing the importance of predicting when this threshold will be reached.

Type of papers: Papers using any economic, computer science, engineering, and/or scientific methods to predict new types, impacts, vulnerabilities, etc., of future malware are welcome.

Program Committee: Please see the program committee page.

Venue: Dallas is known for being the headquarters of several companies. Dallas has several museums and is a multi-cultural city with a variety of food. Dallas has direct national and international flights, in particular to Brisbane, Frankfurt, London, Paris, Tokyo, and to several cities in South America. Moreover, local transportation is excellent; e.g., Dallas has the largest tram system in the USA and its public transportation system is one of the best in the USA.

The historic hotel, Warwick Melrose, which was recently renovated, is close to McKinney Avenue, known for dining and bars. GameSec will also be in Dallas on November 11-12, 2013.