IWSEC 2019 - CALL FOR PAPERS The 14th International Workshop on Security, IWSEC 2019, calls for papers. Date: August 28 - 30 , 2019 (Wed - Fri) Venue: Tokyo Institute of Technology, Tokyo, Japan IWSEC 2019 in the web: https://www.iwsec.org/2019/ Submission page: https://www.iwsec.org/2019/submission.html Important Dates: Submission deadline: March 15, 2019 Notification of decision: May 15, 2019 Camera-ready version: June 3, 2019 General Co-Chairs: Shiho Moriai (National Institute of Information and Communications Technology, Japan) Toshihiro Yamauchi (Okayama University, Japan) Program Co-Chairs: Nuttapong Attrapadung (National Institute of Advanced Industrial Science and Technology, Japan) Takeshi Yagi (NTT Security (Japan) KK, Japan) Best Paper Awards: Prizes will be awarded to the authors of the best paper(s) and the best student paper(s). Journal Recommendation: It is planned that Program Co-Chairs will recommend the authors of best papers to submit their full versions to either of the CSEC or ISEC journals after consultation between Program Co-Chairs and the authors. Proceedings: The conference proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series. Banquet: It is planned that IWSEC 2019 banquet will be held at a Tokyo bay cruising restaurant. Conference scope: Original papers on the research and development of various security topics, as well as case studies and implementation experiences, are solicited for submission to IWSEC 2019. Topics of interest for IWSEC 2019 include all theory and practice of cryptography, information security, and network security, as in previous IWSEC workshops. This year IWSEC categorizes topics of interests into the following two tracks: A : Cryptography Track Applied cryptography Biometrics security and privacy Blockchain and cryptocurrency Cryptanalysis Cryptographic primitives Cryptographic protocols Financial cryptography Formal methods for security analysis Multiparty computation Post-quantum cryptography Privacy-preserving data mining Public-key cryptography Real-world cryptographic systems Security/privacy for machine learning Symmetric-key cryptography B : Cybersecurity and Privacy Track Attacks and defenses Cyber physical systems security Forensics Hardware security Internet-of-Things security Intrusion detection and prevention Law and ethic cybersecurity Machine learning for cybersecurity Malware analysis Measurements for cybersecurity Mobile and web security Network, system and cloud security Privacy-enhancing technologies Program analysis Usable security and privacy IWSEC 2019 CfP: https://www.iwsec.org/2019/cfp.html Tweets @iwsec : https://twitter.com/iwsec