Presidential Public Library, 18-19 October 2023

Important Dates for Paper Submission
Paper submission deadline:         16 August 2023
Announcement date of accepted papers:   4 September2023
Final version deadline: : 11 September 2023
Deadline for conference registration:    13 October 2023

ISCTURKIYE 2023: We hope to come together!

The purpose of this conference is to bring together researchers and scientists from a diversity of subdisciplines from the fields of information security and cryptography in Turkey. The scope of the conference is quite broad as it aims to bring together scientists from a diversity of subdisciplines from the fields of information security and cryptography such as ISCTURKIYE 2023: Information Security and Cryptography conferences are a forum for discussion of basic aspects and new trends in information security and cryptography on the highest level of national expertise in Turkey.

We invite researchers and practitioners working in the field of information security and cryptography to join us on October 18-19, 2023.

Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.

Paper Submission:
You must register and submit your papers via this link. Papers can have maximum 6 pages.

Click to View Copyright.

Paper format:
The paper format must be prepared according to A4-size paper (NOT US Letter) format as presented in IEEE website (IEEE Manuscript Template for Conference Proceedings.)

Call for Papers
Conference topics are given below but not limited to:

Information Security
5G Security
Access Control
Big Data Security and Privacy
Biometry Applications and Standards
Cloud Security / Privacy
Computer Forensics
Cyber Crime
Cyber Security
Database Security
Embedded Systems Security
Identity Management Systems
Information Laws and Regulations
IoT Security
Mobile Security
Network Security
Operating Systems Security
Secure Software
Security Protocols
Sensor Systems
Surveillance Systems
Threats, Vulnerabilities, and Risk Management
Wireless Security

Applications of Finite Fields
Applied Cryptography
Cryptographic Architectures and Applications
Cryptographic Attacks, Theory, Implementation and Countermeasures
Cryptographic Protocols
Error Correcting Codes
Finite Field Arithmetic
Homomorphic Encryption
Lightweight Cryptography
Post-Quantum Cryptography
Pseudorandom Number Generators
Quantum Computing for Cryptography
Quantum Cryptanalysis
Quantum Cryptography
Side Channel Attacks

Registration fee:
No Fee For Participation