Instructions for authors

Click here for a PDF version of the call for papers.
Click here for an e-mail friendly version of the call for papers.

The conference seeks submissions from academia, industry and government that present novel research on all theoretical and practical aspects of Information Security. Topics of interest include, but are not limited to:

  • access control
  • accountability
  • anonymity and pseudonymity
  • applied cryptography
  • authentication
  • biometrics
  • computer forensics
  • cryptographic protocols
  • database security
  • data/system integrity
  • digital right management
  • economics of security and privacy
  • electronic frauds
  • formal methods in security
  • identity management
  • information dissemination control
  • intrusion detection
  • insider threats
  • IT forensics tools and methods
  • malware design
  • network security
  • privacy
  • secure cloud computing
  • security and privacy in pervasive/ubiquitous computing
  • security for embedded systems
  • security for mobile code
  • security in IT outsourcing
  • security in location services
  • security in social networks
  • security modeling and architectures
  • security of eCommerce, eBusiness and eGovernment
  • software security
  • trust models and trust management policies
  • web security

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions are limited to 16 pages in the llncs style, including bibliography and any appendices; each submission must be intelligible and self-contained within this length. All submissions should be appropriately anonymized (i.e., should not contain author names or affiliations, or obvious citations).
Submissions must be made at the web page: Only pdf submissions will be accepted. Submissions not meeting these guidelines risk rejection without review. At least one author of each accepted paper is required to register with the conference and present the paper. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series.
There will be a best paper award and a best student paper award. Any paper co-authored by a full-time student is eligible for both the best student paper award and the best paper award. Authors of selected papers will be invited to submit extended versions of their ISC'12 papers to a Special Issue of the ISI-ranked International Journal of Information Security (IJIS).

Important Dates

  • Paper Submission deadline: 26th of April 7th of May - US West Coast (Pacific Standard Time).
  • Notification of acceptance: 15th of June.
  • Proceedings version deadline: 6th of July.
  • ISC2012 conference: 19th of September - 21st of September.