IMPACT SCORE JOURNAL RANKING CONFERENCE RANKING Conferences Journals Workshops Seminars SYMPOSIUMS MEETINGS BLOG LaTeX 5G Tutorial Free Tools
IWSEC 2025 : The 20th International Workshop on Security (2nd Submission)
IWSEC 2025 : The 20th International Workshop on Security (2nd Submission)

IWSEC 2025 : The 20th International Workshop on Security (2nd Submission)

Fukuoka, Japan
Event Date: November 25, 2025 - November 27, 2025
Submission Deadline: July 17, 2025
Notification of Acceptance: September 15, 2025
Camera Ready Version Due: October 01, 2025




Call for Papers

#### IWSEC 2025 Call for Papers ####
The 20th International Workshop on Security
November 25 (Tue) -- November 27 (Thu), 2025
ACROS Fukuoka, Fukuoka, Japan

Web page: https://www.iwsec.org/2025
IWSEC is an annual international workshop in Japan, co-organized by
ISEC in ESS of IEICE and CSEC of IPSJ.

** Important Dates **
First submission
Submission of paper: April 10, 2025 (AoE) [extended]
Notification of decision: June 2, 2025
Camera-ready version due: June 18, 2025

Second submission
Submission of paper: July 17, 2025
Notification of decision: September 15, 2025
Camera-ready version due: October 1, 2025

IWSEC 2025: November 25 (Tue) -- November 27 (Thu), 2025

Original papers on the research and development of various security topics, as well as case studies and implementation experiments, are solicited for submission to IWSEC 2025. Topics of interest for IWSEC 2025 include all theory and practice of cryptography, information security, and network security, as in the previous IWSEC workshops.

-Applied cryptography
-Biometrics security and privacy
-Blockchain and cryptocurrency
-Cryptanalysis
-Cryptographic primitives
-Cryptographic protocols
-Cyber physical systems
-Cyberattacks and defenses
-Financial cryptography
-Forensics
-Formal methods for security analysis
-Hardware security
-Human-computer interaction, security, and privacy
-Internet-of-Things security
-Intrusion detection and prevention
-Law and ethics of cybersecurity
-Machine learning and AI security
-Malware analysis
-Measurements for cybersecurity
-Mobile and web security
-Multiparty computation
-Network, system and cloud security
-Offensive security
-Post-quantum cryptography
-Privacy-enhancing technologies
-Privacy-preserving data mining
-Program analysis
-Public-key cryptography
-Real-world cryptographic systems
-Software security
-Supply chain security
-Symmetric-key cryptography

** Best Paper Award **
Prizes will be awarded to the authors of the Best Paper(s) and the Best Student Paper(s). The main author of the Best Student Paper(s) should be a full-time graduate or undergraduate student as of March 2025.

** Journal Recommendation **
It is planned that Program Co-Chairs will recommend the authors of selected papers to submit their full versions to either of "IEICE Trans. on Fundamentals, Special Section on Cryptography and Information Security" or "Journal of Information Processing" after consultation between Program Co-Chairs and the authors.

** Proceedings **
It is planned to publish the conference proceedings by Springer, in the Lecture Notes in Computer Science (LNCS) Series. All past IWSEC proceedings have been published in LNCS.

** Instruction for Authors **
All submitted papers must be original, unpublished, and not submitted in parallel to any other peer-reviewed conferences or journals. Submitted papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references.

Authors should consult Springer's authors' guidelines and use their proceedings templates, either for LaTeX or for Word, for the preparation of their papers. Springer encourages authors to include their ORCIDs in their papers. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.

Submitted papers may contain at most 16 pages excluding appendices and references, and at most 20 pages including appendices and references. The Abstract input to EasyChair should be less than 500 words. Note that according to the latest LNCS guideline, appendices are required to be placed before the references. Figures and tables with color can be included in papers. However, these materials will appear in black and white in the conference proceedings.

Optionally, any amount of clearly marked supplementary materials may be supplied, following after the main body of the submitted paper; however, reviewers are not required to read or review them, and submissions should be intelligible without them. Supplementary materials are mostly intended for additional data such as experimental data or source code. Note that supplementary materials are not allowed to be included in the camera-ready version.

** Committees **
General Co-Chairs:
Shinsaku Kiyomoto (KDDI Research Inc., Japan)
Tatsuya Mori (Waseda University, Japan)

Program Co-Chairs:
Carlos Cid (Okinawa Institute of Science and Technology, Japan, and Simula UiB, Norway)
Naoto Yanai (Panasonic, Japan)

Program Committee:
Yoshinori Aono (National Institute of Information and Communications Technology, Japan)
Frederik Armknecht (University of Mannheim, Germany)
Lejla Batina (Radboud University, The Netherlands)
Gregory Blanc (Telecom SudParis, France)
Lorenzo Cavallaro (University College London, UK)
Sofía Celi (Brave, Portugal)
Eyasu Getahun Chekole (Singapore University of Technology and Design, Singapore)
Chen-Mou Cheng (Chang Gung University, Taiwan)
Tung Chou (Academia Sinica, Taiwan)
Ben Curtis (Zama, France)
Bernardo David (IT University of Copenhagen, Denmark)
Alex Davidson (University of Lisbon, Portugal)
Herve Debar (Telecom SudParis, France)
Benjamin Dowling (King's College London, UK)
Betül Durak (Microsoft Research, USA)
Maria Eichlseder (Graz University of Technology, Austria)
Keke Gai (Beijing Institute of Technology, China)
Sujin Han (KAIST, South Korea)
Pieter Hartel (Technische Universiteit Delft, The Netherlands)
Harsha Kalutarage (Robert Gordon University, UK)
Noboru Kunihiro (University of Tsukuba, Japan)
Péter Kutas (Eötvös Loránd University, Hungary, and University of Birmingham, UK)
Hiroki Kuzuno (Kobe University, Japan)
Yasuhiko Ikematsu (Kyushu University, Japan)
Takanori Isobe (University of Hyogo, Japan)
Mitsugu Iwamoto (The University of Electro-Communications, Japan)
Wen-jie Lu (TikTok Inc.)
Frederic Majorczyk (DGA-MI/CentraleSupelec, France)
Keith Martin (Royal Holloway University of London, UK)
Weizhi Meng (Technical University of Denmark, Denmark)
Mamoru Mimura (National Defense Academy, Japan)
Kazuhiko Minematsu (NEC and Yokohama National University, Japan)
Alexios Mylonas (University of Hertfordshire, UK)
Anderson Nascimento (Visa Research, USA)
Kazumasa Omote (University of Tsukuba, Japan)
Morten Øygarden (Simula UiB, Norway)
Raphael Phan (Monash University, Malaysia)
Santanu Sarkar (IIT Madras, India)
André Schrottenloher (Inria Rennes, France)
Janak Senanayake (Robert Gordon University, UK)
Toshiki Shibahara (NTT Social Informatics Laboratories, Japan)
Janno Siim (University of Tartu, Estonia)
Dario Stabili (University of Bologna, Italy)
Yosuke Todo (NTT Social Informatics Laboratories, Japan)
Raylin Tso (National Cheng-Chi University, Taiwan)
Rei Ueno (Kyoto University, Japan)
Giorgos Vasiliadis (Hellenic Mediterranean University, Greece)
Meiqin Wang (Shandong University, China)
Hongjun Wu (Nanyang Technological University, Singapore)
Keita Xagawa (Technology Innovation Institute, Abu Dhabi)
Yang Chen (Nanyang Technological University, Singapore)
Zeyu Yang (Singapore University of Technology and Design, Singapore)
Oguz Yayla (Middle East Technical University, Turkey)
Kuo-Hui Yeh (National Dong Hwa University, Taiwan)
Ilsun You (Kookmin University, South Korea)
Stefano Zanero (Polytechnic of Milan, Italy)

If you have any questions, please contact the organizers at [email protected]

IWSEC 2025 home page: https://www.iwsec.org/2025
==================================



Summary

IWSEC 2025 : The 20th International Workshop on Security (2nd Submission) will take place in Fukuoka, Japan. It’s a 3 days event starting on Nov 25, 2025 (Tuesday) and will be winded up on Nov 27, 2025 (Thursday).

IWSEC 2025 falls under the following areas: CRYPTOGRAPHY, CYBERSECURITY, PRIVACY, SECURITY, etc. Submissions for this Workshop can be made by Jul 17, 2025. Authors can expect the result of submission by Sep 15, 2025. Upon acceptance, authors should submit the final version of the manuscript on or before Oct 1, 2025 to the official website of the Workshop.

Please check the official event website for possible changes before you make any travelling arrangements. Generally, events are strict with their deadlines. It is advisable to check the official website for all the deadlines.

Other Details of the IWSEC 2025

  • Short Name: IWSEC 2025
  • Full Name: The 20th International Workshop on Security (2nd Submission)
  • Timing: 09:00 AM-06:00 PM (expected)
  • Fees: Check the official website of IWSEC 2025
  • Event Type: Workshop
  • Website Link: https://www.iwsec.org/2025
  • Location/Address: Fukuoka, Japan


Credits and Sources

[1] IWSEC 2025 : The 20th International Workshop on Security (2nd Submission)


Check other Conferences, Workshops, Seminars, and Events


OTHER CRYPTOGRAPHY EVENTS

CSP 2026: 2026 10th International Conference on Cryptography, Security and Privacy (CSP 2026)
Sapporo, Japan
Apr 25, 2026
CCSW 2025: The ACM Cloud Computing Security Workshop
Taipei, Taiwan
Oct 17, 2025
ACM QRSEC 2025: ACM CCS Workshop on Quantum-Resistant Cryptography and Security (ACM QRSEC 2025)
Taipei, Taiwan
Oct 13, 2025
CheckMATE 2025: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks @ ACM CCS 2025
Taipei, Taiwan
Oct 17, 2025
BLKCA 2025: 3rd International Conference on Blockchain and Applications
Virtual Conference
Aug 9, 2025
SHOW ALL

OTHER CYBERSECURITY EVENTS

FPS 2025: Foundations and Practice of Security
Brest
Nov 25, 2025
3D-Sec 2025: Deepfake, Deception, and Disinformation Security (3D-Sec) Workshop co-located with CCS '25
Taipei, Taiwan
Oct 13, 2025
escar Europe 2025: escar Europe 2025 - The World´s Leading Automotive Cyber Security Conference
Frankfurt, Germany
Nov 5, 2025
ICEA 2025: International Conference on Intelligent computing and Its emerging Application 2025 (ICEA 2025)
Melbourne, Australia
Dec 3, 2025
IEEE GCAIoT 2025: Call for Papers! 9th Edition of the 2025 IEEE Global Conference on Artificial Intelligence and Internet of Things
Marrakesh, Morocco
Nov 23, 2025
SHOW ALL

OTHER PRIVACY EVENTS

SPTM 2025: 13th International Conference of Security, Privacy and Trust Management
London, United Kingdom
Jul 26, 2025
DPM 2025: 20th International Workshop on Data Privacy Management (DPM 2025)
Toulouse, France
Sep 25, 2025
ICAISG--EI 2025: 2025 International Conference on Artificial Intelligence Security and Governance (ICAISG 2025)
Hangzhou, China
Dec 12, 2025
WIPE-OUT 2025: Workshop on Innovations, Privacy-preservation, and Evaluations Of machine Unlearning Techniques
Porto, Portugal
Sep 15, 2025
FPS 2025: Foundations and Practice of Security
Brest
Nov 25, 2025
SHOW ALL

OTHER SECURITY EVENTS

SPTM 2025: 13th International Conference of Security, Privacy and Trust Management
London, United Kingdom
Jul 26, 2025
ICMIP--EI 2026: 2026 11th International Conference on Multimedia and Image Processing (ICMIP 2026)
Sapporo, Japan
Apr 25, 2026
CSP--EI 2026: 2026 10th International Conference on Cryptography, Security and Privacy (CSP 2026)
Sapporo, Japan
Apr 25, 2026
ICSIE--EI 2026: 2026 14th International Conference on Software and Information Engineering (ICSIE 2026)
Himeji, Japan
Jan 16, 2026
ICNT--EI 2026: 2026 8th International Conference on Network Technology (ICNT 2026)
Himeji, Japan
Jan 16, 2026
SHOW ALL