SECRYPT: International Conference on Security and Cryptography

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2016 or later   |   Invite the Organizers Email

Permanent:   Official Site http://www.secrypt.icete.org

 
 

All CFPs on WikiCFP

Event When Where Deadline
SECRYPT 2015 12th International Conference on Security and Cryptography
Jul 20, 2015 - Jul 22, 2015 Colmar, France Mar 17, 2015
SECRYPT 2014 11th International Conference on Security and Cryptography
Aug 28, 2014 - Aug 30, 2014 Vienna, Austria Apr 29, 2014
SECRYPT 2013 10th International Conference on Security and Cryptography
Jul 29, 2013 - Jul 31, 2013 Reykjavík, Iceland Mar 18, 2013
SECRYPT 2012 International Conference on Security and Cryptography (SECRYPT)
Jul 24, 2012 - Jul 27, 2012 Rome, Italy Mar 5, 2012
SECRYPT 2011 International Conference on Security and Cryptography (SECRYPT)
Jul 18, 2011 - Jul 21, 2011 Seville - Spain Feb 3, 2011
SECRYPT 2010 5th International Conference on Security and Cryptography
Jul 26, 2010 - Jul 28, 2010 Athens, Greece Mar 25, 2010
 
 

Present CFP : 2015

*** Deadline extended to March 17, 2015 ***

************************************************************************
12th International Conference on Security and Cryptography (SECRYPT 2015)
Colmar, France, 20-22 July 2015
http://secrypt.icete.org
************************************************************************

SECRYPT is an annual international conference covering research in
information and communication security. The 12th International
Conference on Security and Cryptography (SECRYPT 2015) will be held in
Colmar, France, 20-22 July 2015. The conference seeks submissions from
academia, industry, and government presenting novel research on all
theoretical and practical aspects of data protection, privacy, security,
and cryptography. Papers describing the application of security technology,
the implementation of systems, and lessons learned are also encouraged.


CONFERENCE TOPICS
The conference topics include, but are not limited to:

Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security


PAPER SUBMISSIONS
Submitted papers must be in English and must not substantially overlap with papers that
have been published or that are simultaneously submitted to a journal or a conference with
proceedings. Submissions are to be made to the submission web site at
http://www.insticc.org/primoris/.

Papers can be submitted as REGULAR or POSITION papers.

- REGULAR Paper: Regular papers present work where research is completed. They can be up
to 12 pages. Authors of regular submitted papers will indicate at the time of submission
whether they would like their paper to also be considered for publication as a position
paper.

- POSITION Paper: A position paper presents results that are preliminary or that simply
require fewer pages to describe. A position paper may be a short report and discussion of
ideas, facts, situations, methods, procedures or results of scientific research
(theoretical or experimental) on one of the conference topics. The acceptance of a
position paper is restricted to the categories of "short paper"

Submitted papers must be formatted according to the SECRYPT format, which is described at
http://secrypt.icete.org/GuidelinesTemplates.aspx.

Submission page limit is 12 pages for regular paper and 8 pages for position papers.
Accepted papers will be subject to the limit of: 12 pages for full papers, 8 pages for
short papers with oral presentation, and 6 pages for short papers with poster presentation.
Authors of accepted papers must guarantee that their papers will be presented at the
conference. All papers presented in the conference will be published in the conference
proceedings and in the digital library. A short list of presented papers will be selected
so that revised and extended versions of these papers will be published by Springer-Verlag
in a CCIS Series book.


IMPORTANT DATES
Regular and Position Papers
- Paper Submission: March 17, 2015 (11:59 PM American Samoa Time) [extended]
- Authors Notification: May 16, 2015
- Camera Ready and Registration: June 1, 2015

Second call for Position Papers only:
- Paper Submission: April 17, 2015
- Authors Notification: May 18, 2015
- Camera Ready and Registration: June 1, 2015


PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy


PROGRAM COMMITTEE
Alessandro Armando, FBK, Italy
Reza Azarderakhsh, Rochester Institute of Technology, United States
Prithvi Bisht, Adobe, United States
Carlo Blundo, Universita' di Salerno, Italy
Andrey Bogdanov, Technical University of Denmark, Denmark
Francesco Buccafurri, University of Reggio Calabria, Italy
Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong
Frederic Cuppens, TELECOM Bretagne, France
Nora Cuppens-Boulahia, Institut Mines Telecom / Telecom Bretagne, France
Jun Dai, California State University at Sacramento, United States
Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre, Italy
Tassos Dimitriou, Computer Technology Institute, Greece and Kuwait University, Kuwait
Ruggero Donida Labati, Universita' degli Studi di Milano, Italy
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Bao Feng, Security and Privacy Lab, Huawei, Singapore
Alberto Ferrante, Universita' della Svizzera italiana, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
William M. Fitzgerald, United Technologies Research Center Ireland (UTRCI), Ireland
Sara Foresti, Universita' degli Studi di Milano, Italy
Steven Furnell, Plymouth University, United Kingdom
Joaquin Garcia-Alfaro, Institut Mines-Telecom, TELECOM SudParis, France
Dieter Gollmann, Tu Hamburg-Harburg, Germany
Mark Gondree, Naval Postgraduate School, United States
Dimitris A. Gritzalis, Athens University of Economics & Business, Greece
Sotiris Ioannidis, Foundation for Research and Technology - Hellas, Greece
Wael Kanoun, Bell Labs, France
Sokratis Katsikas, University of Piraeus, Greece
Florian Kerschbaum, SAP, Germany
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Adam Lee, University of Pittsburgh, United States
Patrick P. C. Lee, The Chinese University of Hong Kong, Hong Kong
Albert Levi, Sabanci University, Turkey
Ming Li, Utah State University, United States
Jiguo Li, Hohai University, China
Peng Liu, Penn. State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Haibing Lu, Santa Clara University, United States
Emil Lupu, Imperial College London, United Kingdom
Olivier Markowitch, Universite' Libre de Bruxelles, Belgium
Fabio Martinelli, IIT-CNR, Italy
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero, UTFPR - Federal University of Technology - Paraná state, Brazil
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Mehran Mozaffari-Kermani, Rochester Institute of Technology, United States
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Joon Park, Syracuse University, United States
Gerardo Pelosi, Politecnico di Milano, Italy
Gunther Pernul, University of Regensburg, Germany
Joachim Posegga, Institute of IT Security and Security Law, Germany
Silvio Ranise, Fondazione Bruno Kessler, Italy
Kui Ren, state university of new york at buffalo, United States
Andreas Schaad, Huawei Research, Germany
Daniele Sgandurra, Imperial College, London, United Kingdom
Nicolas Sklavos, Technological Educational Institute of Western Greece, Greece
Einar Snekkenes, Gjøvik University College, Norway
Alessandro Sorniotti, IBM Research - Zurich, Switzerland
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Vicenc Torra, U. of Skövde, Sweden
Jaideep Vaidya, Rutgers Business School, United States
Luca Vigano’, University of Verona, Italy
Haining Wang, The College of William and Mary, United States
Xinyuan (Frank) Wang, George Mason University, United States
Ping Wang, Symantec Corporation, United States
Cong Wang, City University of Hong Kong, Hong Kong
Lingyu Wang, Concordia University, Canada
Edgar Weippl, SBA Research / TU Wien, Austria
Meng Yu, Virginia Commonwealth University, United States
Lei Zhang, Thomson Reuters, United States
Hang Zhao, Columbia University, United States
Jianying Zhou, Institute for Infocomm Research, Singapore

For any questions, please contact the program chair:
secrypt2015@unimi.it
 

Related Resources

ACISP 2017   Australasian Conference on Information Security and Privacy
FC 2017   Financial Cryptography and Data Security 2017
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
TrustCom 2017   16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
SOUPS 2017   Symposium on Usable Privacy and Security
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
BDCloud 2017   The 7th IEEE International Conference on Big Data and Cloud Computing
ACNS 2017   The 15th International Conference on Applied Cryptography and Network Security
INSERT 2017   1st International Conference on Security, Privacy, and Trust (INSERT'17)