ISSISP is open to students, academics, and professionals from academia,
government, and industry. The number of attendee places is strictly limited.
Prospective attendees should submit an expression of interest here.
Expressions of interest will continue to be reviewed until the first day of
the School (9th July). Please contact firstname.lastname@example.org with any
specific questions regarding registration.
Successful applicants will be notified promptly and receive a link to the payment website to confirm their registration.
Registration costs include School only registration, plus additional optional accommodation and dinner guests.
|Student||$200 (limited scholarships available to students)|
|Optional Accommodation||Per night|
|University House Standard Twin (2 single beds) with private bathroom||$150|
|University House Standard Twin Share (2 single beds) with private bathroom||$75 per person|
|Breakfast with Standard Twin Room||$20 per person|
|Other accommodation by personal arrangement||Market rate|
|Registrant Conference Dinner (included in Registration Fee)||$0|
|Additional Conference Dinner (for additional guests)||$100 per person|
Registration includes light breakfast, lunch, Wednesday afternoon outing, and Wednesday evening conference dinner. Registration instructions will be provided to applicants with offer of attendance. Registration payments are non-refundable after the start of the School. Refunds prior to the start of the School will incur an administration fee of $50. Those wishing to take the Twin Share accommodation option must nominate a roommate at registration or indicate willingness to be matched to a roommate.
Call for Posters
We will invite all ISSISP attendees to submit their innovative ideas and ongoing work in the area of information security and protection for presentation at the School in the form of a poster. At least one poster author must register to attend ISSISP. Topics of interest include, but are not limited to:
- Applications of cryptography
- Cloud security
- Combating software and hardware privacy
- Computer forensics
- Cyber attack and defence strategies
- Formal methods in security
- Language-based security
- Mobile and system security
- Network security
- Reverse engineering, vulnerability analysis and malware analysis
- Side channel attacks
Posters will be published here after the summer school. Prizes will also be awarded for best posters!