SECRYPT: International Conference on Security and Cryptography

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2018 or later   |   Invite the Organizers Email

Permanent:   Official Site http://www.secrypt.icete.org

 
 

All CFPs on WikiCFP

Event When Where Deadline
SECRYPT 2017 14th International Conference on Security and Cryptography
Jul 26, 2017 - Jul 28, 2017 Madrid, Spain Mar 2, 2017
SECRYPT 2015 12th International Conference on Security and Cryptography
Jul 20, 2015 - Jul 22, 2015 Colmar, France Mar 17, 2015
SECRYPT 2014 11th International Conference on Security and Cryptography
Aug 28, 2014 - Aug 30, 2014 Vienna, Austria Apr 29, 2014
SECRYPT 2013 10th International Conference on Security and Cryptography
Jul 29, 2013 - Jul 31, 2013 Reykjavík, Iceland Mar 18, 2013
SECRYPT 2012 International Conference on Security and Cryptography (SECRYPT)
Jul 24, 2012 - Jul 27, 2012 Rome, Italy Mar 5, 2012
SECRYPT 2011 International Conference on Security and Cryptography (SECRYPT)
Jul 18, 2011 - Jul 21, 2011 Seville - Spain Feb 3, 2011
SECRYPT 2010 5th International Conference on Security and Cryptography
Jul 26, 2010 - Jul 28, 2010 Athens, Greece Mar 25, 2010
 
 

Present CFP : 2017

CALL FOR PAPERS
14th International Conference on Security and Cryptography SECRYPT

website: http://www.secrypt.icete.org/

July 26 - 28, 2017 Madrid, Spain

In Cooperation with: ITG
Co-organized by: Universidad Rey Juan Carlos
Sponsored by: INSTICC
INSTICC is Member of: WfMC, OMG and FIPA
Logistics Partner: SCITEVENTS


IMPORTANT DATES:

Regular Paper Submission: March 2, 2017
Authors Notification (regular papers): May 3, 2017
Final Regular Paper Submission and Registration: May 17, 2017

Scope:
SECRYPT is an annual international conference covering research in information and communication security. The 14th International Conference on Security and Cryptography (SECRYPT 2017) will be held in Madrid, Spain on 26-28 July 2017.
The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography.
Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged.

Conference Topics:
Area 1: SECRYPT - International Conference on Security and Cryptography
- Access Control
- Applied Cryptography
- Biometrics Security and Privacy
- Critical Infrastructure Protection
- Data Integrity
- Data Protection
- Database Security and Privacy
- Digital Forensics
- Digital Rights Management
- Ethical and Legal Implications of Security and Privacy
- Formal Methods for Security
- Human Factors and Human Behavior Recognition Techniques
- Identification, Authentication and Non-repudiation
- Identity Management
- Information Hiding
- Information Systems Auditing
- Insider Threats and Countermeasures
- Intellectual Property Protection
- Intrusion Detection & Prevention
- Management of Computing Security
- Network Security
- Organizational Security Policies
- Peer-to-Peer Security
- Personal Data Protection for Information Systems
- Privacy
- Privacy Enhancing Technologies
- Reliability and Dependability
- Risk Assessment
- Secure Software Development Methodologies
- Security and Privacy for Big Data
- Security and privacy in Complex Systems
- Security and Privacy in Crowdsourcing
- Security and Privacy in IT Outsourcing
- Security and Privacy in Location-based Services
- Security and Privacy in Mobile Systems
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in Smart Grids
- Security and Privacy in Social Networks
- Security and Privacy in the Cloud
- Security and Privacy in Web Services
- Security and Privacy Policies
- Security Area Control
- Security Deployment
- Security Engineering
- Security in Distributed Systems
- Security Information Systems Architecture
- Security Management
- Security Metrics and Measurement
- Security Protocols
- Security requirements
- Security Verification and Validation
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and QoS Network Security
- Software Security
- Trust management and Reputation Systems
- Ubiquitous Computing Security
- Wireless Network Security



SECRYPT KEYNOTE LECTURE
Charalabos Skianis, University of the Aegean, Greece
Carlo Regazzoni, University of Genova, Italy
Jan Camenisch, IBM Research - Zurich, Switzerland
Jose Duato, UPV, Spain


SECRYPT CONFERENCE CO-CHAIRS:
Mohammad S. Obaidat, Fordham University, United States
Enrique Cabello, Universidad Rey Juan Carlos, Spain

PROGRAM CHAIR:
Pierangela Samarati, Università degli Studi di Milano, Italy

PROGRAM COMMITTEE
http://www.secrypt.icete.org//ProgramCommittee.aspx

SECRYPT Secretariat
Address: Av. D. Manuel I, 27A, 2º esq.
Tel: +351 265 520 185
Fax: +351 265 520 186
Web: http://www.secrypt.icete.org/
e-mail: secrypt.secretariat@insticc.org
 

Related Resources

ACISP 2017   Australasian Conference on Information Security and Privacy
GameSec 2017   GameSec 2017 : Conference on Decision and Game Theory for Security
EuropeanSeC 2017   2017 European Security Conference
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
FC 2017   Financial Cryptography and Data Security 2017
ESORICS 2017   Twenty-second European Symposium on Research in Computer Security
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
DBSec 2017   31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
ACNS 2017   The 15th International Conference on Applied Cryptography and Network Security
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities