International Conference on Information Systems Security and Privacy explained
The International Conference on Information Systems Security and Privacy – ICISSP – aims to create a meeting point for practitioners and researchers interested in security and privacy challenges that concern information systems covering technological and social issues.
The format of the conference counts on technical sessions, poster sessions, tutorials, doctoral consortiums, panels, industrial tracks and keynote lectures. The papers presented in the conference are made available at the SCITEPRESS digital library, published in the conference proceedings and some of the best papers are invited to a post-publication with Springer,[1] in a CCIS Series book.
ICISSP also counts on keynote talks. Some of the invited speakers announced in the previous editions of the conference were: Ross J. Anderson (University of Cambridge, UK), Elisa Bertino (Purdue University, USA), Bart Preneel (KU Leuven, Belgium), Jason Hong (Carnegie Mellon University, USA) and Steven Furnell (University of Plymouth, UK).
Conference topics
Editions and proceedings
Proceedings of the 6th International Conference on Information Systems Security and Privacy. [2]
ICISSP 2019 – Prague, Czech Republic
Proceedings of the 5th International Conference on Information Systems Security and Privacy. [3]
Best Paper Award – Dayana Spagnuelo, Ana Ferreira and Gabriele Lenzini, “Accomplishing Transparency within the General Data Protection Regulation” [4]
Best Student Paper Award - Maja Nyman and Christine Große, “Are You Ready When It Counts? IT Consulting Firm’s Information Security Incident Management” [5]
ICISSP 2018 – Funchal, Madeira, Portugal
Proceedings of the 4th International Conference on Information Systems Security and Privacy. [6]
Best Paper Award – Wei-Han Lee, Jorge Ortiz, Bongjun Ko and Ruby Lee, “Inferring Smartphone Users’ Handwritten Patterns by using Motion Sensors” [7]
Best Student Paper Award - Vincent Haupert and Tilo Müller, “On App-based Matrix Code Authentication in Online Banking” [8]
Proceedings of the 3rd International Conference on Information Systems Security and Privacy. [9]
Best Paper Award – Lake Bu and Mark G. Karpovsky, “A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices” [10]
Best Student Paper Award - Iman Sedeeq, Frans Coenen and Alexei Lisitsa, “Attribute Permutation Steganography Detection using Attribute Position Changes Count” [11]
Proceedings of the 2nd International Conference on Information Systems Security and Privacy. [12]
Best Paper Award – Christoph Kerschbaumer, Sid Stamm and Stefan Brunthaler. “Injecting CSP for Fun and Security” [13]
Best Student Paper Award - Kexin Qiao, Lei Hu and Siwei Sun, “Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques” [14]
ICISSP 2015 – ESEO, Angers, Loire Valley, France
Proceedings of the 1st International Conference on Information Systems Security and Privacy . [15]
Best Paper Award - Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frincu and Viktor Prasanna. "Model-driven Privacy Assessment in the Smart Grid"[16] [17]
Best Student Paper Award - Carsten Büttner and Sorin A. Huss. "A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks"[18]
External links
Notes and References
- Book: Camp. Olivier. Weippl. Edgar. Bidan. Christophe. Aïmeur. Esma. Information Systems Security and Privacy: First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers. Springer. 9783319276687. 2015-12-31.
- Web site: Proceedings of the 6th International Conference on Information Systems Security and Privacy.
- Web site: Proceedings of the 5th International Conference on Information Systems Security and Privacy.
- Book: Lenzini . Gabriele . Ferreira . Ana . Spagnuelo . Dayana . Proceedings of the 5th International Conference on Information Systems Security and Privacy . Accomplishing Transparency within the General Data Protection Regulation . 2019 . 114–125 . 10.5220/0007366501140125 . 978-989-758-359-9 . free.
- Book: Große . Christine . Nyman . Maja . Proceedings of the 5th International Conference on Information Systems Security and Privacy . Are You Ready when It Counts? IT Consulting Firm's Information Security Incident Management . 2019 . 26–37 . 10.5220/0007247500260037 . 978-989-758-359-9 . free.
- Web site: Proceedings of the 4th International Conference on Information Systems Security and Privacy.
- Book: Lee . Ruby . Ko . Bongjun . Ortiz . Jorge . Lee . Wei-Han . Proceedings of the 4th International Conference on Information Systems Security and Privacy . Inferring Smartphone Users' Handwritten Patterns by using Motion Sensors . 2018 . 139–148 . 10.5220/0006650301390148 . 978-989-758-282-0 . free.
- Book: Müller . Tilo . Haupert . Vincent . Proceedings of the 4th International Conference on Information Systems Security and Privacy . On App-based Matrix Code Authentication in Online Banking . 2018 . 149–160 . 10.5220/0006650501490160 . 978-989-758-282-0 . free.
- Web site: Proceedings of the 3rd International Conference on Information Systems Security and Privacy.
- Book: g. Karpovsky . Mark . Bu . Lake . Proceedings of the 3rd International Conference on Information Systems Security and Privacy . A Design of Secure and ReliableWireless Transmission Channel for Implantable Medical Devices . 2017 . 233–242 . 10.5220/0006270502330242 . 978-989-758-209-7 . free.
- Book: Lisitsa . Alexei . Coenen . Frans . Sedeeq . Iman . Proceedings of the 3rd International Conference on Information Systems Security and Privacy . Attribute Permutation Steganography Detection using Attribute Position Changes Count . 2017 . 95–100 . 10.5220/0006166400950100 . 978-989-758-209-7. 6224450 .
- Web site: ICISSP 2016 dblp information.
- Book: Brunthaler . Stefan . Proceedings of the 2nd International Conference on Information Systems Security and Privacy . Stamm . Sid . Kerschbaumer . Christoph . Injecting CSP for Fun and Security . 2016 . 978-989-758-167-0 . 15–25 . 10.5220/0005650100150025.
- Book: Sun . Siwei . Hu . Lei . Qiao . Kexin . Proceedings of the 2nd International Conference on Information Systems Security and Privacy . Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques . 2016 . 978-989-758-167-0 . 74–84 . 10.5220/0005684400740084.
- Web site: ICISSP 2015 dblp information.
- Book: 2015 . 978-989-758-081-9 . 173–181 . 10.1.1.590.5685 . 10.5220/0005229601730181 . Model-driven Privacy Assessment in the Smart Grid . Proceedings of the 1st International Conference on Information Systems Security and Privacy .
- Book: Model-driven privacy assessment in the smart grid . February 2015 . IEEE Computer Society . 9781467384056 . 1–9.
- Book: 2015 . 978-989-758-081-9 . 259–269 . 10.5220/0005238902590269 . A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks . Proceedings of the 1st International Conference on Information Systems Security and Privacy .