Papers

14th INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CYPTOLOGY

ISCTURKEY 2021

Presidential Public Library, 2-3 December 2021

Important Dates for Paper Submission
Paper submission deadline:        October 15, 2021
Notification of accepted papers:    November 7, 2021
Deadline for conference registration:      November 26, 2021

ISCTURKEY 2021: We hope to come together!

The purpose of this conference is to bring together researchers and scientists from a diversity of subdisciplines from the fields of information security and cryptography in Turkey. The scope of the conference is quite broad as it aims to bring together scientists from a diversity of subdisciplines from the fields of information security and cryptography such as ISCTURKEY 2021: Information Security and Cryptography conferences are a forum for discussion of basic aspects and new trends in information security and cryptography on the highest level of national expertise in Turkey.

We invite researchers and practitioners working in the field of information security and cryptography to join us on December 2-3, 2021.

Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.

Paper Submission:
You must register and submit your papers via this link. Papers can have maximum 6 pages.

Copyright:
Click to View Copyright.

Paper format:
The paper format must be prepared according to A4-size paper (NOT US Letter) format as presented in IEEE website (IEEE Manuscript Template for Conference Proceedings.)

Call for Papers
Conference topics are given below but not limited to:

Information Security
5G Security
Access Control
Authentication
Big Data Security and Privacy
Biometry Applications and Standards
Cloud Security / Privacy
Computer Forensics
Cyber Crime
Cyber Security
Database Security
Embedded Systems Security
Identity Management Systems
Information Laws and Regulations
IoT Security
Mobile Security
Network Security
Operating Systems Security
Secure Software
Security Protocols
Sensor Systems
Surveillance Systems
Threats, Vulnerabilities, and Risk Management
Wireless Security

Cryptology
Applications of Finite Fields
Applied Cryptography
Cryptographic Architectures and Applications
Cryptographic Attacks, Theory, Implementation and Countermeasures
Cryptographic Protocols
Error Correcting Codes
Finite Field Arithmetic
Homomorphic Encryption
Lightweight Cryptography
Post-Quantum Cryptography
Pseudorandom Number Generators
Quantum Computing for Cryptography
Quantum Cryptanalysis
Quantum Cryptography
Side Channel Attacks

Information Security and Data Privacy in Health
Data Security, privacy and privacy

Registration fee:
To Be Determined Per Paper
BUY NOW