IWSEC2020: The 15th International Workshop on Security Happiring Hall and Fukui International Activities Plaza Fukui, Japan, September 2-4, 2020 |
| Conference website | https://www.iwsec.org/2020/ |
| Submission link | https://easychair.org/conferences/?conf=iwsec2020 |
| Submission deadline | March 31, 2020 |
Submission Guidelines
All submitted papers must be original, unpublished, and not submitted in parallel to any other peer-reviewed conferences or journals. Submitted papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references.
Authors should consult Springer's authors' guidelines and use their proceedings templates, either for LaTeX or for Word, for the preparation of their papers. Springer encourages authors to include their ORCIDs in their papers. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.
Submitted papers may contain at most 16 pages excluding appendices and references, and at most 20 pages including appendices and references. The Abstract input to EasyChair should be less than 500 words. Note that according to the latest LNCS guideline, appendices are required to be placed before the references. Figures and tables with color can be included in papers. However, these materials will appear in black and white in the conference proceedings.
Optionally, any amount of clearly marked supplementary materials may be supplied, following after the main body of the submitted paper; however, reviewers are not required to read or review them, and submissions should be intelligible without them. Supplementary materials are mostly intended for additional data such as experimental data or source code. Note that supplementary materials are not allowed to be included in the camera-ready version.
Submissions are to be made via the submission website. Only PDF files will be accepted. Please choose track (A or B) when submitting. Submissions not meeting these guidelines may be rejected without consideration of their merit. Also, for more appropriate reviews, your paper may be reviewed on the other track than the track selected. For each accepted paper, at least one of the authors must register for the workshop before the due date of the camera-ready version and is also required to present the paper at the workshop. The title and the list of authors of the final version cannot be changed from the submitted version unless otherwise approved by the program co-chairs. Note that some papers may be accepted as short papers, merged papers, or conditionally accepted for shepherding.
Best Paper Awards
Prizes will be awarded to the authors of the Best Paper(s) and the Best Student Paper(s). Program Committees will select awards sometime after the paper notification and before the conference.
To be eligible for Best Student Paper Award, the main author should be a full-time graduate or undergraduate student as of March 2020. To enter as a candidate, please tick the appropriate box in the online submission form. Candidates must submit a copy of their student ID with facial photo to the Program Chairs (after the paper notification).
List of Topics
- Track A: Cryptography Track
- Applied cryptography
- Biometrics security and privacy
- Blockchain and cryptocurrency
- Cryptanalysis
- Cryptographic primitives
- Cryptographic protocols
- Financial cryptography
- Formal methods for security analysis
- Multiparty computation
- Post-quantum cryptography
- Privacy-preserving data mining
- Public-key cryptography
- Real-world cryptographic systems
- Security/privacy for machine learning
- Symmetric-key cryptography
- Track B: Cybersecurity and Privacy Track
- Attacks and defenses
- Cyber physical systems security
- Forensics
- Hardware security
- Internet-of-Things security
- Intrusion detection and prevention
- Law and ethic cybersecurity
- Machine learning for cybersecurity
- Malware analysis
- Measurements for cybersecurity
- Mobile and web security
- Network, system and cloud security
- Privacy-enhancing technologies
- Program analysis
- Usable security and privacy
Committees
General co-Chairs
- Shoichi Hirose (The University of Fukui, Japan)
- Toshihiro Yamauchi (Okayama University, Japan)
Advisory Committee
- Hideki Imai (The University of Tokyo, Japan)
- Kwangjo Kim (Korea Advanced Institute of Science and Technology, Korea)
- Christopher Kruegel (University of California, Santa Barbara, USA)
- Günter Müller (University of Freiburg, Germany)
- Yuko Murayama (Tsuda University, Japan)
- Koji Nakao (National Institute of Information and Communications Technology, Japan)
- Eiji Okamoto (University of Tsukuba, Japan)
- C. Pandu Rangan (Indian Institute of Technology Madras, India)
- Kai Rannenberg (Goethe University Frankfurt, Germany)
- Ryoichi Sasaki (Tokyo Denki University, Japan)
Program co-Chairs
- Kazumaro Aoki (Bunkyo University, Japan)
- Akira Kanaoka (Toho University, Japan)
Program Committee
- Track A: Cryptography Track
- Geoffroy Couteau (IRIF, Paris-Diderot University, CNRS, France)
- Bernardo David (IT University of Copenhagen, Denmark)
- Itai Dinur (Ben-Gurion University, Israel)
- Antonio Faonio (IMDEA Software Institute, Spain)
- Yuichi Komano (Toshiba Corporation, Japan)
- Florian Mendel (Infineon Technologies, Germany)
- Kazuhiko Minematsu (NEC, Japan)
- Toru Nakanishi (Hiroshima University, Japan)
- Miyako Ohkubo (NICT, Japan)
- Thomas Poeppelmann (Infineon Technologies Austria AG, Austria)
- Yusuke Sakai (AIST, Japan)
- Jae Hong Seo (Hanyang University, Republic of Korea)
- Yannick Seurin (Agence Nationale de la Securite des Systemes d'Information, France)
- Takeshi Sugawara (The University of Electro-Communications, Japan)
- Willy Susilo (University of Wollongong, Australia)
- Katsuyuki Takashima (Mitsubishi Electric Corporation, Japan)
- Atsushi Takayasu (University of Tokyo, Japan)
- Mehdi Tibouchi (NTT, Japan)
- Damien Vergnaud (Sorbonne Universite, UPMC, CNRS, France)
- Yuyu Wang (University of Electronic Science and Technology of China, China)
- Yohei Watanabe (The University of Electro-Communications, Japan)
- Bo-Yin Yang (Academia Sinica, Taiwan)
- Track B: Cybersecurity and Privacy Track
- Mitsuaki Akiyama (Nippon Telegraph and Telephone Corporation, Japan)
- Josep Balasch (KU Leuven, Belgium)
- Gregory Blanc (Telecom SudParis, France)
- Herve Debar (Telecom SudParis, France)
- Josep Domingo-Ferrer (Universitat Rovira i Virgili, Catalonia)
- Kimmo Halunen (VTT Technical Research Centre of Finland Ltd., Finland)
- Yuichi Hayashi (Nara Institute of Science and Technology, Japan)
- Mika Juuti (University of Waterloo, Canada)
- Frederic Majorczyk (DGA-MI/CentraleSupelec, France)
- Ryo Nojima (National Institute of Information and Communications Technology, Japan)
- Yoshihiro Oyama (University of Tsukuba, Japan)
- Giorgos Vasiliadis (Qatar Computing Research Institute HBKU, Greece)
- Takeshi Yagi (NTT Security (Japan) KK, Japan)
- Takumi Yamamoto (Mitsubishi Electric Corporation, Japan)
Organizing committee
- Masahiro Fujita (Mitsubishi Electric Corporation, Japan)
- Ryo Fujita (Chuo University, Japan)
- Yuichi Hayashi (Nara Institute of Science and Technology, Japan)
- Xuping Huang (Advanced Institute of Industrial Technology, Japan)
- Yasuhiko Ikematsu (Kyushu University, Japan)
- Tetsuya Izu (Fujitsu Laboratories Ltd., Japan)
- Satoru Izumi (Tohoku University, Japan)
- Kazuya Kakizaki (NEC Corporation, Japan)
- Toru Nakanishi (Hiroshima University, Japan)
- Ryo Nojima (National Institute of Information and Communications Technology, Japan)
- Kazuma Ohara (National Institute of Advanced Industrial Science and Technology, Japan)
- Satsuya Ohata (Digital Garage, Inc. Japan)
- Toshiya Shimizu (Fujitsu Laboratories Ltd., Japan)
- Yuji Suga (Internet Initiative Japan Inc., Japan)
- Atsushi Takayasu (The University of Tokyo, Japan)
- Naoto Yanai (Osaka University, Japan)
- Sven Wohlgemuth (Hitachi, Ltd., Japan)
- TBD
Publication
The conference proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.
Information from Springer: Even if IWSEC 2020 would be postponed, held online, or cancelled because of COVID-19, LNCS conference proceedings will be published.
Venue
The conference will be held at Happiring Hall and Fukui International Activities Plaza, Fukui, Japan between 2-4 September 2020.
