CfP IWSEC 2019 (The 14th International Workshop on Security)

April 1, 2019

The 14th International Workshop on Security (IWSEC 2019) will be held in Tokyo, Japan on 28-30 August 2019. IWSEC 2019 is co-organized by ISEC in ESS of IEICE (Technical Committee on Information Security in Engineering Sciences Society of the Institute of Electronics, Information and Communication Engineers) and CSEC of IPSJ (Special Interest Group on Computer Security of Information ... 

The submission page is open at

Important Dates:
 Submission deadline: April 2nd, 2019 (23:59 UTC) [Extended]
 Notification of decision: May 27th, 2019 [Extended]
 Camera-ready version due: June 7th, 2019 (23:59 UTC) [Extended]

General Co-Chairs:
    Shiho Moriai (National Institute of Information and Communications Technology, Japan)
    Toshihiro Yamauchi (Okayama University, Japan) 

Program Co-Chairs:
    Nuttapong Attrapadung (National Institute of Advanced Industrial Science and Technology, Japan)
    Takeshi Yagi (NTT Security (Japan) KK, Japan)

Best Paper Awards: 
 Prizes will be awarded to the authors of the best paper(s) and the best student paper(s).

Journal Recommendation: 
 It is planned that Program Co-Chairs will recommend the authors of best papers to submit their full versions to either of the CSEC
or ISEC journals after consultation between Program Co-Chairs and the authors.

 The conference proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series. 

 It is planned that IWSEC 2019 banquet will be held at a Tokyo bay cruising restaurant.

Conference scope:
 Original papers on the research and development of various security topics, as well as case studies and implementation experiences,
are solicited for submission to IWSEC 2019. Topics of interest for IWSEC 2019 include all theory and practice of cryptography,
information security, and network security, as in previous IWSEC workshops.

In addition, in this year we categorize topics of interests into the following two tracks:

A : Cryptography Track

  •  Applied cryptography
  •  Biometrics security and privacy
  •  Blockchain and cryptocurrency
  •  Cryptanalysis
  •  Cryptographic primitives
  •  Cryptographic protocols
  •  Financial cryptography
  •  Formal methods for security analysis
  •  Multiparty computation
  •  Post-quantum cryptography
  •  Privacy-preserving data mining
  •  Public-key cryptography
  •  Real-world cryptographic systems
  •  Security/privacy for machine learning
  •  Symmetric-key cryptography

B : Cybersecurity and Privacy Track

  •  Attacks and defenses
  •  Cyber physical systems security
  •  Forensics
  •  Hardware security
  •  Internet-of-Things security
  •  Intrusion detection and prevention
  •  Law and ethic cybersecurity
  •  Machine learning for cybersecurity
  •  Malware analysis
  •  Measurements for cybersecurity
  •  Mobile and web security
  •  Network, system and cloud security
  •  Privacy-enhancing technologies
  •  Program analysis
  •  Usable security and privacy