The 14th International Workshop on Security, IWSEC 2019, calls for papers.
Date: August 28 - 30 , 2019 (Wed - Fri)
Venue: Tokyo Institute of Technology, Tokyo, Japan

IWSEC 2019 in the web: https://www.iwsec.org/2019/
Submission page: https://www.iwsec.org/2019/submission.html

Important Dates:
Submission deadline: March 15, 2019
Notification of decision: May 15, 2019
Camera-ready version: June 3, 2019

General Co-Chairs:
    Shiho Moriai (National Institute of Information and Communications 
                  Technology, Japan)
    Toshihiro Yamauchi (Okayama University, Japan)

Program Co-Chairs:
    Nuttapong Attrapadung (National Institute of Advanced Industrial Science 
                           and Technology, Japan)
    Takeshi Yagi (NTT Security (Japan) KK, Japan)

Best Paper Awards:
 Prizes will be awarded to the authors of the best paper(s) and the
 best student paper(s).

Journal Recommendation:
 It is planned that Program Co-Chairs will recommend the authors of
 best papers to submit their full versions to either of the CSEC or
 ISEC journals after consultation between Program Co-Chairs and the

 The conference proceedings will be published by Springer in the
 Lecture Notes in Computer Science (LNCS) series.

 It is planned that IWSEC 2019 banquet will be held at a Tokyo bay
 cruising restaurant.

Conference scope:
Original papers on the research and development of various security
topics, as well as case studies and implementation experiences, are
solicited for submission to IWSEC 2019. Topics of interest for IWSEC
2019 include all theory and practice of cryptography, information
security, and network security, as in previous IWSEC workshops.

This year IWSEC categorizes topics of interests into the following two tracks:

A : Cryptography Track
Applied cryptography
Biometrics security and privacy
Blockchain and cryptocurrency
Cryptographic primitives
Cryptographic protocols
Financial cryptography
Formal methods for security analysis
Multiparty computation
Post-quantum cryptography
Privacy-preserving data mining
Public-key cryptography
Real-world cryptographic systems
Security/privacy for machine learning
Symmetric-key cryptography

B : Cybersecurity and Privacy Track
Attacks and defenses
Cyber physical systems security
Hardware security
Internet-of-Things security
Intrusion detection and prevention
Law and ethic cybersecurity
Machine learning for cybersecurity
Malware analysis
Measurements for cybersecurity
Mobile and web security
Network, system and cloud security
Privacy-enhancing technologies
Program analysis
Usable security and privacy

IWSEC 2019 CfP: https://www.iwsec.org/2019/cfp.html
Tweets @iwsec : https://twitter.com/iwsec