IWSEC 2023: The 18th International Workshop on Security Institute of Information Security Yokohama, Japan, August 29-31, 2023 |
Conference website | https://www.iwsec.org/2023/ |
Submission link | https://easychair.org/conferences/?conf=iwsec2023 |
Submission deadline [extended] | April 3, 2023 |
Submission Guidelines
All submitted papers must be original, unpublished, and not submitted in parallel to any other peer-reviewed conferences or journals. Submitted papers must be written in English and be fully anonymous with no author names, affiliations, acknowledgements, or obvious references.
Authors should consult Springer's authors' guidelines and use their proceedings templates, either for LaTeX or for Word, for the preparation of their papers. Springer encourages authors to include their ORCIDs in their papers. In addition, the corresponding author of each paper, acting on behalf of all of the authors of that paper, must complete and sign a Consent-to-Publish form. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made.
Submitted papers may contain at most 16 pages excluding appendices and references, and at most 20 pages including appendices and references. The Abstract input to EasyChair should be less than 500 words. Note that according to the latest LNCS guideline, appendices are required to be placed before the references. Figures and tables with color can be included in papers. However, these materials will appear in black and white in the conference proceedings.
Optionally, any amount of clearly marked supplementary materials may be supplied, following after the main body of the submitted paper; however, reviewers are not required to read or review them, and submissions should be intelligible without them. Supplementary materials are mostly intended for additional data such as experimental data or source code. Note that supplementary materials are not allowed to be included in the camera-ready version.
Submissions are to be made via EasyChair. Only PDF files will be accepted. Please choose track (A or B) when submitting. Submissions not meeting these guidelines may be rejected without consideration of their merit. Also, for more appropriate reviews, your paper may be reviewed on the other track than the track selected. For each accepted paper, at least one of the authors must register for the workshop before the due date of the camera-ready version and is also required to present the paper at the workshop. The title and the list of authors of the final version cannot be changed from the submitted version unless otherwise approved by the program co-chairs. Note that some papers may be accepted as short papers, merged papers, or conditionally accepted for shepherding.
Best Paper Award
Prizes will be awarded to the authors of the Best Paper(s) and the Best Student Paper(s). Program Committees will select awards sometime after the paper notification and before the conference.
To be eligible for Best Student Paper Award, the main author should be a full-time graduate or undergraduate student as of March 2023. To enter as a candidate, please tick the appropriate box in the online submission form. Candidates must submit a copy of their student ID with facial photo to the Program Chairs (after the paper notification).
List of Topics
Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2023. Topics of interest for IWSEC 2023 include all theory and practice of cryptography, information security, and network security, as in the previous IWSEC workshops. We classify the topics of interest into two tracks as follows, but not limited to:
- A: Cryptography Track
- Applied cryptography
- Biometrics security and privacy
- Blockchain and cryptocurrency
- Cryptanalysis
- Cryptographic primitives
- Cryptographic protocols
- Financial cryptography
- Formal methods for security analysis
- Multiparty computation
- Post-quantum cryptography
- Privacy-preserving data mining
- Public-key cryptography
- Real-world cryptographic systems
- Symmetric-key cryptography
- B: Cybersecurity, Usable Security, and Privacy Track
- Cyberattacks and defenses
- Cyber physical systems
- Forensics
- Hardware security
- Human-computer interaction, security, and privacy
- Internet-of-Things security
- Intrusion detection and prevention
- Law and ethics of cybersecurity
- Machine learning and AI security
- Malware analysis
- Measurements for cybersecurity
- Mobile and web security
- Network, system and cloud security
- Offensive security
- Privacy-enhancing technologies
- Program analysis
- Software security
- Supply chain security
Important Dates
- Submission deadline: March 26, 2023 (23:59 UTC)
- Notification of decision: May 30, 2023
- Camera-ready version due: June 16, 2023
Committees
General co-Chairs
- Goichiro Hanaoka (National Institute of Advanced Industrial Science and Technology, Japan)
- Koji Chida (Gunma University, Japan)
Program co-Chairs
- Junji Shikata (Yokohama National University, Japan)
- Hiroki Kuzuno (Kobe University, Japan)
Program Committee
- Track A: Cryptography Track
- TBD
- Track B: Cybersecurity, Usable Security, and Privacy Track
- TBD
Local Organizing Committee
- Masaki Hashimoto (Institute of Information Security, Japan)
- Kuniyasu Suzaki (Institute of Information Security, Japan)
- Mamoru Mimura (National Defense Academy, Japan)
- Takeshi Nakai (Toyohashi University of Technology, Japan)
- Atsushi Fujioka (Kanagawa University, Japan)
- Yohei Watanabe (The University of Electro-Communications, Japan)
- Kazumasa Shinagawa (Ibaraki University, Japan)
- Shohei Kakei (Nagoya Institute of Technology, Japan)
- Misato Nakabayashi (NTT Social Informatics Laboratories, Japan)
- Yasuhiro Murasaki (Japan Broadcasting Corporation, Japan)
- Motohiro Kambashi (Sumitomo Mitsui Banking Corporation)
- Takayuki Nagane (National Institute of Advanced Industrial Science and Technology, Japan)
- Ai Kuwagata (National Institute of Advanced Industrial Science and Technology, Japan)
- Kyosuke Yamashita (Osaka University, Japan)
- Hyungrok Jo (Yokohama National University, Japan)
- Shohei Satake (Meiji University, Japan)
- Yuntao Wang (Osaka University, Japan)
- Yujie Gu (Kyushu University, Japan)
Publication
The conference proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.
Journal Recommendation
It is planned that Program Co-Chairs will recommend the authors of best papers to submit their full versions to "IEICE Trans. on Fundamentals, Special Section on Cryptography and Information Security" after consultation between Program Co-Chairs and the authors.
Venue
The conference will be held hybrid at Institute of Information Security, in Yokohama, Japan and ONLINE between August 29--31, 2023.