CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
WohlgemuthSven / WOHLGEMUTH,SVEN <[log in to unmask]>
Reply To:
WohlgemuthSven / WOHLGEMUTH,SVEN <[log in to unmask]>
Date:
Wed, 18 Mar 2020 01:16:49 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (115 lines)
==== Information from General Co-Chairs and Program Co-Chairs of IWSEC 2020 ====
The 15th International Workshop on Security (IWSEC 2020) will be held as planned on September 2 to 4, in Fukui, Japan.

The organizers currently do not plan to make any changes in response to COVID-19 outbreak. We will continue to monitor the latest situation and if there is a change in schedule and/or plan, we will immediately announce it on this web page.
https://www.iwsec.org/2020/ 

=================================
####  IWSEC 2020 Call for Papers  ####
  The 15th International Workshop on Security
  September 2 (Wed)-September 4 (Fri), 2020
  Happiring Hall and Fukui International Activities Plaza, Fukui, Japan

  Web page: https://www.iwsec.org/2020/ 
  Co-organized by CSEC of IPSJ, Japan, and by ISEC of IEICE, Japan

** Important Dates **
   Submission of paper:             March 23, 2020
   Notification of decision:        May 22, 2020
   Camera-ready version due:  June 10, 2020
   IWSEC 2020 Workshop:        September 2 (Wed)-September 4 (Fri), 2020

Original papers on the research and development of various security topics, as well as case studies
and implementation experiences, are solicited for submission to IWSEC 2020. Topics of interest for 
IWSEC 2020 include all theory and practice of cryptography, information security, and network security, 
as in the previous IWSEC workshops. We classify the topics of interest into two tracks as follows, 
but not limited to:

A: Cryptography track
- Applied cryptography                - Financial cryptography                               - Post-quantum cryptography
- Cryptanalysis                               - Formal methods and security analysis     - Privacy-preserving data mining
- Cryptographic obfuscation       - Implementation attacks                             - Public-key cryptography
- Cryptographic primitives          - Lightweight cryptography                          - Real-world cryptographic systems
- Cryptographic protocols           - Multiparty computation                             - Secure and fast implementation
                                                                                                                                   - Symmetric-key cryptography
B: Cybersecurity and privacy track
- Cyber attacks and defenses         - Intrusion detection and prevention       - Mobile and web security
- Cyber physical systems security  - Law and ethics cybersecurity                  - Network, system and cloud security
- Forensics                                         - Machine learning for cybersecurity       - Privacy-enhancing technologies
- Hardware security                         - Anti-malware techniques                        - Program analysis
- Internet-of-Things security          - Measurements for cybersecurity           - Usable security and privacy

** Best Paper Award **
  Prizes will be awarded to the authors of the Best Paper(s) and the Best Student Paper(s). Program Committees 
will select awards sometime after the paper notification and before the conference.

  To be eligible for Best Student Paper Award, the main author should be a full-time graduate or undergraduate 
student as of March 2020. To enter as a candidate, please tick the appropriate box in the online submission form. 
Candidates must submit a copy of their student ID with facial photo to the Program Chairs (after the paper 
notification).

** Journal Recommendation **
  It is planned that Program Co-Chairs will recommend the authors of best papers to submit their full versions
to either of "IEICE Trans. on Fundamentals, Special Section on Cryptography and Information Security" or
"Journal of Information Processing, CSEC Special Issue" after consultation between Program Co-Chairs and the 
authors.

** Proceedings **
  The conference proceedings will be published by Springer, in the Lecture Notes in Computer Science (LNCS) 
Series. All of the past IWSEC proceedings have been published in LNCS.

** Instruction for Authors **
  All submitted papers must be original, unpublished, and not submitted in parallel to any other peer-reviewed
conferences or journals. Submitted papers must be written in English and be fully anonymous with no author
names, affiliations, acknowledgements, or obvious references.

  Authors should consult Springer's authors' guidelines and use their proceedings templates, either for LaTeX
or for Word, for the preparation of their papers. Springer encourages authors to include their ORCIDs in their
papers. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that
paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form
should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes
relating to the authorship of the papers cannot be made.

  Submitted papers may contain at most 16 pages excluding appendices and references, and at most 20 pages
including appendices and references. The Abstract input to EasyChair should be less than 500 words. Note that
according to the latest LNCS guideline, appendices are required to be placed before the references. Figures and
tables with color can be included in papers. However, these materials will appear in black and white in the
conference proceedings.

  Optionally, any amount of clearly marked supplementary materials may be supplied, following after the main
body of the submitted paper; however, reviewers are not required to read or review them, and submissions
should be intelligible without them. Supplementary materials are mostly intended for additional data such
as experimental data or source code. Note that supplementary materials are not allowed to be included in the
camera-ready version.

  Submissions are to be made via the submission website. Only PDF files will be accepted. Please choose track
(A or B) when submitting. Submissions not meeting these guidelines may be rejected without consideration of
their merit. Also, for more appropriate reviews, your paper may be reviewed on the other track than the track
selected. For each accepted paper, at least one of the authors must register for the workshop before the due
date of the camera-ready version and is also required to present the paper at the workshop. The title and the
list of authors of the final version cannot be changed from the submitted version unless otherwise approved by
the program co-chairs. Note that some papers may be accepted as short papers, merged papers, or conditionally
accepted for shepherding.

** Committees **
General Co-Chairs:
  Shoichi Hirose (University of Fukui, Japan) 
  Toshihiro Yamauchi (Okayama University, Japan)

Program Co-Chairs:
  Kazumaro Aoki (NTT, Japan)
  Akira Kanaoka (Toho University, Japan) 

(Last update: February 1, 2020)
==================================

    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2