posted by system || 6150 views || tracked by 13 users: [display]

SECRYPT 2011 : International Conference on Security and Cryptography

FacebookTwitterLinkedInGoogle

Link: http://secrypt.icete.org
 
When Jul 18, 2011 - Jul 21, 2011
Where Seville, Spain
Submission Deadline Feb 3, 2011
Notification Due Apr 16, 2011
 

Call For Papers

In cooperation with IACR (International Association for Cryptologic Research),
WfMC (Workflow Management Coalition),
IEICE (The Institute of Electronics, Information and Communication Engineers),
SWIM (Special Interest Group on Software Interprise Modeling),
ATI (Asociacion de Tecnicos de Informatica),
CEPIS (Council of European Professional Informatics Societies),
ACM SIGSAC (ACM Special Interest Group on Security, Audit and Control) and
FIDETIA (Fundacion para la Investigacion y el Desarrollo de las Tecnologias de la Informacion en Andalucia)

In Collaboration with Higher Technical School of Computer Engineering, University of Seville

Sponsored by INSTICC


Important Deadlines:
Regular Paper submission: February 3, 2011
Authors Notification (regular papers): April 16, 2011
Final Regular Paper Submission and Registration: May 5, 2011

SECRYPT is an annual international conference covering research in information and communication security.
The International Conference on Security and Cryptography (SECRYPT 2011) will be held in Seville, Spain.
The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, applications security, and cryptography.
Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged.
The conference topics include, but are not limited to:

› Access Control
› Applied Cryptography
› Biometrics Security and Privacy
› Critical Infrastructure Protection
› Data Integrity
› Data Protection
› Database Security and Privacy
› Digital Forensics
› Digital Rights Management
› Ethical and Legal Implications of Security and Privacy
› Human Factors and Human Behaviour Recognition Techniques
› Identification, Authentication and Non-repudiation
› Identity Management
› Information Hiding
› Information Systems Auditing
› Insider Threats and Countermeasures
› Intellectual Property Protection
› Intrusion Detection & Prevention
› Management of Computing Security
› Network Security
› Organizational Security Policies
› Peer-to-Peer Security
› Personal Data Protection for Information Systems
› Privacy
› Reliability and Dependability
› Risk Assessment
› Secure Cloud Computing
› Secure Software Development Methodologies
› Security and Privacy in Mobile Systems
› Security and Privacy in Complex Systems
› Security and Privacy in IT Outsourcing
› Security and Privacy in Location-based Services
› Security and Privacy in Pervasive/Ubiquitous Computing
› Security and Privacy in Social Networks
› Security and Privacy in Web Sevices
› Security and Privacy Policies
› Security Area Control
› Security Deployment
› Security Engineering
› Security for Grid Computing
› Security in Distributed Systems
› Security Information Systems Architecture and Design and Security Patterns
› Security Management
› Security Metrics and Measurement
› Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
› Security Verification and Validation
› Sensor and Mobile Ad Hoc Network Security
› Service and Systems Design and QoS Network Security
› Software Security
› Trust Management and Reputation Systems
› Ubiquitous Computing Security
› Wireless Network Security (WiFi, WiMAX, WiMedia and others)

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted:

- Regular Paper. A regular paper presents a work where the research is completed or almost finished. Authors of regular submitted papers
will indicate at the time of submission whether they would like their paper to also be considered for publication as a position paper.

- Position Paper: A position paper presents results that are preliminary or that simply require few pages to describe. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics. The acceptance of a position paper is restricted to the categories of "short paper" or "poster".


Authors of accepted papers must guarantee that their papers will be presented at the conference.

Accepted papers will have to be formatted according to the SECRYPT format, which is described at
http://secrypt.icete.org/paper_formats.asp, and adhere to the page limit of 10 pages (for full papers), 6 pages (for short papers), and 4 pages (for posters).


Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.

A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book.

Additionally, a short list of papers presented at the conference, will also be selected for publication in the CEPIS UPGRADE Journal and in the REICIS Journal.

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index, INSPEC, DBLP and EI.
Best paper awards will be bestowed at the conference closing session.
All papers presented at the conference venue will also be available at SciTePress' Digital Library (http://www.scitepress.org/DigitalLibrary).


CONFERENCE CO-CHAIRS
Mohammad S. Obaidat, Monmouth University, U.S.A.
Jose Sevillano, University of Seville, Spain

PROGRAM CO-CHAIRS
Pierangela Samarati, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain


PROGRAM COMMITTEE
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Giampaolo Bella, Università Di Catania, Italy
Marina Blanton, University of Notre Dame, United States
Carlo Blundo, Università di Salerno, Italy
Gil Pino Caballero, Universidad De La Laguna, Spain
David Chadwick, University of Kent, United Kingdom
Jorge Cuellar, Siemens AG, Germany
Frédéric Cuppens, Ecole Nationale De Télécommunications De Bretagne, France
Paolo D'arco, University of Salerno, Italy
Jorge Davila, UPM, Spain
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita' degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Amparo Fúster-Sabater, C.S.I.C., Spain
R. M. Gasca, University of Seville, Spain
Antonio Gómez-skarmeta, University of Murcia, Spain
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Ragib Hasan, Johns Hopkins University, United States
Jordi Herrera, UAB, Spain
Jiankun Hu, RMIT University, Australia
Michael Huth, Imperial College London, United Kingdom
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser Katzenbeisser, Technische Universität Darmstadt, Germany
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China

(list not yet complete)



This call for papers and additional information about the conference can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs: secrypt2011@unimi.it

Related Resources

SECRYPT 2020   17th International Conference on Security and Cryptography
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
KEOD 2020   12th International Conference on Knowledge Engineering and Ontology Development
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
AsiaCCS 2021   The 16th ACM ASIA Conference on Computer and Communications Security [First Round]
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
CCNC 2021   IEEE Consumer Communications & Networking Conference
Symmetry-SI 2020   Special issue on Symmetry and Asymmetry in IoT and CPS Security and Privacy
ACNS 2021   19th International Conference on Applied Cryptography and Network Security
ICPR-IETBiom-VSaaS 2021   25th ICPR Special Issue on Real-Time Visual Surveillance as-a-Service (VSaaS) for Smart Security Solutions in IET Biometrics