Presidential Public Library, 19-20 October 2022

Important Dates for Paper Submission
Paper submission deadline:        10 August 2022
Announcement date of accepted papers:   27 August 2022
Abstract submission deadline: 5 September 2022
Deadline for conference registration:     1 October 2022

ISCTURKEY 2022: We hope to come together!

The purpose of this conference is to bring together researchers and scientists from a diversity of subdisciplines from the fields of information security and cryptography in Turkey. The scope of the conference is quite broad as it aims to bring together scientists from a diversity of subdisciplines from the fields of information security and cryptography such as ISCTURKEY 2022: Information Security and Cryptography conferences are a forum for discussion of basic aspects and new trends in information security and cryptography on the highest level of national expertise in Turkey.

We invite researchers and practitioners working in the field of information security and cryptography to join us on October 19-20, 2022.

Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.

Paper Submission:
You must register and submit your papers via this link. Papers can have maximum 6 pages.

Click to View Copyright.

Paper format:
The paper format must be prepared according to A4-size paper (NOT US Letter) format as presented in IEEE website (IEEE Manuscript Template for Conference Proceedings.)

Call for Papers
Conference topics are given below but not limited to:

Information Security
5G Security
Access Control
Big Data Security and Privacy
Biometry Applications and Standards
Cloud Security / Privacy
Computer Forensics
Cyber Crime
Cyber Security
Database Security
Embedded Systems Security
Identity Management Systems
Information Laws and Regulations
IoT Security
Mobile Security
Network Security
Operating Systems Security
Secure Software
Security Protocols
Sensor Systems
Surveillance Systems
Threats, Vulnerabilities, and Risk Management
Wireless Security

Applications of Finite Fields
Applied Cryptography
Cryptographic Architectures and Applications
Cryptographic Attacks, Theory, Implementation and Countermeasures
Cryptographic Protocols
Error Correcting Codes
Finite Field Arithmetic
Homomorphic Encryption
Lightweight Cryptography
Post-Quantum Cryptography
Pseudorandom Number Generators
Quantum Computing for Cryptography
Quantum Cryptanalysis
Quantum Cryptography
Side Channel Attacks

Information Security and Data Privacy in Health
Data Security, privacy and privacy

Registration fee:
To Be Determined Per Paper