IMPACT SCORE JOURNAL RANKING CONFERENCE RANKING Conferences Journals Workshops Seminars SYMPOSIUMS MEETINGS BLOG LaTeX 5G Tutorial Free Tools
IWSEC 2024 : International Workshop on Security
IWSEC 2024 : International Workshop on Security

IWSEC 2024 : International Workshop on Security

Kyoto
Event Date: September 17, 2024 - September 19, 2024
Submission Deadline: April 16, 2024
Notification of Acceptance: June 20, 2024
Camera Ready Version Due: July 05, 2024




Call for Papers

#### IWSEC 2024 Call for Papers ####
The 19th International Workshop on Security
September 17 (Tue) -- September 19 (Thu), 2024
Kyoto International Conference Center, Kyoto, Japan

Web page: https://www.iwsec.org/2024/
IWSEC is an annual international workshop in Japan, co-organized by ISEC in ESS of IEICE and CSEC of IPSJ.

** Important Dates **
Submission of paper: April 16, 2024 (23:59 UTC)
Notification of decision: June 20, 2024
Camera-ready version due: July 5, 2024
IWSEC 2024 Workshop: September 17 (Tue) -- September 19 (Thu), 2024

Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2024. Topics of interest for IWSEC 2024 include all theory and practice of cryptography, information security, and network security, as in the previous IWSEC workshops. We classify the topics of interest into two tracks as follows, but not limited to:

A: Cryptography track
- Applied cryptography - Cryptographic protocols - Privacy-preserving data mining
- Biometrics security and privacy - Financial cryptogrpahy - Public-key cryptography
- Blockchain and cryptocurrency - Formal methods for security analysis - Real-world cryptographic systems
- Cryptoanalysis - Multiparty computation - Symmetric-key cryptographic systems
- Cryptographic primitives - Post-quantum cryptography

B: Cybersecurity, Usable Security, and Privacy Track
- Cyberattacks and defenses - Internet-of-Things security - Mobile and web security
- Cyber physical systems - Intrusion detection and prevention - Network, system and cloud security
- Forensics - Law and ethics of cybersecurity - Offensive security
- Hardware security - Machine learning and AI security - Privacy-enhancing technologies
- Human-computer interaction, security and privacy - Malware analysis - Program analysis
- Measurements for cybersecurity - Software security - Supply chain security

** Best Paper Award **
Prizes will be awarded to the authors of the Best Paper(s) and the Best Student Paper(s). Program Committees will select awards sometime after the paper notification and before the conference. To be eligible for Best Student Paper Award, the main author should be a full-time graduate or undergraduate student as of March 2024. To enter as a candidate, please tick the appropriate box in the online submission form. Candidates must submit a copy of their student ID with facial photo to the Program Chairs (after the paper notification).

** Journal Recommendation **
It is planned that Program Co-Chairs will recommend the authors of selected papers to submit their full versions to either of "IEICE Trans. on Fundamentals, Special Section on Cryptography and Information Security" or "Journal of Information Processing" after consultation between Program Co-Chairs and the authors.

** Proceedings **
It is planned to publish the conference proceedings by Springer, in the Lecture Notes in Computer Science (LNCS) Series. All of the past IWSEC proceedings have been published in LNCS.


** Instruction for Authors **
All submitted papers must be original, unpublished, and not submitted in parallel to any other peer-reviewed conferences or journals. Submitted papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references.

Authors should consult Springer's authors' guidelines and use their proceedings templates, either for LaTeX or for Word, for the preparation of their papers. Springer encourages authors to include their ORCIDs in their papers. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the
papers cannot be made.

Submitted papers may contain at most 16 pages excluding appendices and references, and at most 20 pages including appendices and references. The Abstract input to EasyChair should be less than 500 words. Note that according to the latest LNCS guideline, appendices are required to be placed before the references. Figures and tables with color can be included in papers. However, these materials will appear in black and white in the conference proceedings.

Optionally, any amount of clearly marked supplementary materials may be supplied, following after the main body of the submitted paper; however, reviewers are not required to read or review them, and submissions should be intelligible without them. Supplementary materials are mostly intended for additional data such as experimental data or source code. Note that supplementary materials are not allowed to be included in the camera-ready version.

Submissions are to be made via the submission website. Only PDF files will be accepted. Please choose track (A or B) when submitting. Submissions not meeting these guidelines may be rejected without consideration of their merit. Also, for more appropriate reviews, your paper may be reviewed on the other track than the track selected. For each accepted paper, at least one of the authors must register for the workshop before the due date of the camera-ready version and is also required to present the paper at the workshop. The title and the list of authors of the final version cannot be changed from the submitted version unless otherwise approved by the program co-chairs. Note that some papers may be accepted as short papers, merged papers, or conditionally accepted for shepherding.

** Committees **
General Co-Chairs:
Junji Shikata (Yokohama National University, Japan)
Koji Chida (Gunma University, Japan)

Program Co-Chairs:
Kazuhiko Minematsu (NEC, Japan & Yokohama National University, Japan)
Mamoru Mimura (National Defense Academy, Japan)

(Latest update: March 6, 2024)
==================================


Summary

IWSEC 2024 : International Workshop on Security will take place in Kyoto. It’s a 3 days event starting on Sep 17, 2024 (Tuesday) and will be winded up on Sep 19, 2024 (Thursday).

IWSEC 2024 falls under the following areas: CRYPTOGRAPHY, CYBERSECURITY, PRIVACY, SECURITY, etc. Submissions for this Workshop can be made by Apr 16, 2024. Authors can expect the result of submission by Jun 20, 2024. Upon acceptance, authors should submit the final version of the manuscript on or before Jul 5, 2024 to the official website of the Workshop.

Please check the official event website for possible changes before you make any travelling arrangements. Generally, events are strict with their deadlines. It is advisable to check the official website for all the deadlines.

Other Details of the IWSEC 2024

  • Short Name: IWSEC 2024
  • Full Name: International Workshop on Security
  • Timing: 09:00 AM-06:00 PM (expected)
  • Fees: Check the official website of IWSEC 2024
  • Event Type: Workshop
  • Website Link: https://www.iwsec.org/2024/index.html
  • Location/Address: Kyoto


Credits and Sources

[1] IWSEC 2024 : International Workshop on Security


Check other Conferences, Workshops, Seminars, and Events


OTHER CRYPTOGRAPHY EVENTS

CANS 2024: The International Conference on Cryptology and Network Security (CANS)
Cambridge, UK
Sep 24, 2024
CRIS 2024: 10th International Conference on Cryptography and Information Security
Melbourne, Australia
Apr 20, 2024
AsiaJCIS 2024: The 19th Asia Joint Conference on Information Security
Taiwan
Aug 13, 2024
SECRYPT 2024: 21st International Conference on Security and Cryptography
Dijon, France
Jul 8, 2024
MAL-IoT 2024: 9th International Workshop on Malicious Software and Hardware in the Internet of Things
Ischia, Italy
May 7, 2024
SHOW ALL

OTHER CYBERSECURITY EVENTS

CyFRP 2024: Advances in Interdisciplinary Cybersecurity: Insights from Funded Research Projects
Xanthi, Greece
Jun 5, 2024
IMF 2024: International Conference on IT Security Incident Management & IT Forensics
Saarbrücken, Germany
Sep 17, 2024
PST 2024: The 21st Annual International Conference on Privacy, Security & Trust (PST2024)
Sydney, Australia
Aug 28, 2024
MCNA 2024: The International Conference on Multimedia Computing, Networking and Applications
Valencia, Spain
Sep 17, 2024
ICSC 2024: The Fourth Intelligent Cybersecurity Conference
Valencia, Spain
Sep 17, 2024
SHOW ALL

OTHER PRIVACY EVENTS

No Hat 2024: No Hat - COMPUTER SECURITY CONFERENCE
Bergamo, Italy
Oct 19, 2024
GECPS 2024: IEEE Cyber Physical System for Green Energy
Los Angelos
Jun 28, 2024
MDAI 2024: 21st International Conference on Modeling Decisions for Artificial Intelligence
Tokyo, Japan
Aug 27, 2024
PST 2024: The 21st Annual International Conference on Privacy, Security & Trust (PST2024)
Sydney, Australia
Aug 28, 2024
UbiSec 2024: The 4th International Conference on Ubiquitous Security
Changsha, China
Dec 29, 2024
SHOW ALL

OTHER SECURITY EVENTS

CANS 2024: The International Conference on Cryptology and Network Security (CANS)
Cambridge, UK
Sep 24, 2024
ICTCE 2024: 2024 The 6th International Conference on Telecommunications and Communication Engineering (ICTCE 2024)--JA
Chengdu, China
Nov 22, 2024
CECSP 2024: 2024 the International Conference on Electronics, Communications, and Signal Processing (CECSP 2024)
Kunming, China
Oct 25, 2024
ICICM 2024: ACM--2024 The 14th International Conference on Information Communication and Management (ICICM 2024)
France, Paris
Nov 6, 2024
ADIP--EI 2024: 2024 6th Asia Digital Image Processing Conference (ADIP 2024)
Tokyo, Japan
Dec 14, 2024
SHOW ALL