posted by system || 6744 views || tracked by 13 users: [display]

SECRYPT 2011 : International Conference on Security and Cryptography

FacebookTwitterLinkedInGoogle

Link: http://secrypt.icete.org
 
When Jul 18, 2011 - Jul 21, 2011
Where Seville, Spain
Submission Deadline Feb 3, 2011
Notification Due Apr 16, 2011
 

Call For Papers

In cooperation with IACR (International Association for Cryptologic Research),
WfMC (Workflow Management Coalition),
IEICE (The Institute of Electronics, Information and Communication Engineers),
SWIM (Special Interest Group on Software Interprise Modeling),
ATI (Asociacion de Tecnicos de Informatica),
CEPIS (Council of European Professional Informatics Societies),
ACM SIGSAC (ACM Special Interest Group on Security, Audit and Control) and
FIDETIA (Fundacion para la Investigacion y el Desarrollo de las Tecnologias de la Informacion en Andalucia)

In Collaboration with Higher Technical School of Computer Engineering, University of Seville

Sponsored by INSTICC


Important Deadlines:
Regular Paper submission: February 3, 2011
Authors Notification (regular papers): April 16, 2011
Final Regular Paper Submission and Registration: May 5, 2011

SECRYPT is an annual international conference covering research in information and communication security.
The International Conference on Security and Cryptography (SECRYPT 2011) will be held in Seville, Spain.
The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, applications security, and cryptography.
Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged.
The conference topics include, but are not limited to:

› Access Control
› Applied Cryptography
› Biometrics Security and Privacy
› Critical Infrastructure Protection
› Data Integrity
› Data Protection
› Database Security and Privacy
› Digital Forensics
› Digital Rights Management
› Ethical and Legal Implications of Security and Privacy
› Human Factors and Human Behaviour Recognition Techniques
› Identification, Authentication and Non-repudiation
› Identity Management
› Information Hiding
› Information Systems Auditing
› Insider Threats and Countermeasures
› Intellectual Property Protection
› Intrusion Detection & Prevention
› Management of Computing Security
› Network Security
› Organizational Security Policies
› Peer-to-Peer Security
› Personal Data Protection for Information Systems
› Privacy
› Reliability and Dependability
› Risk Assessment
› Secure Cloud Computing
› Secure Software Development Methodologies
› Security and Privacy in Mobile Systems
› Security and Privacy in Complex Systems
› Security and Privacy in IT Outsourcing
› Security and Privacy in Location-based Services
› Security and Privacy in Pervasive/Ubiquitous Computing
› Security and Privacy in Social Networks
› Security and Privacy in Web Sevices
› Security and Privacy Policies
› Security Area Control
› Security Deployment
› Security Engineering
› Security for Grid Computing
› Security in Distributed Systems
› Security Information Systems Architecture and Design and Security Patterns
› Security Management
› Security Metrics and Measurement
› Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
› Security Verification and Validation
› Sensor and Mobile Ad Hoc Network Security
› Service and Systems Design and QoS Network Security
› Software Security
› Trust Management and Reputation Systems
› Ubiquitous Computing Security
› Wireless Network Security (WiFi, WiMAX, WiMedia and others)

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted:

- Regular Paper. A regular paper presents a work where the research is completed or almost finished. Authors of regular submitted papers
will indicate at the time of submission whether they would like their paper to also be considered for publication as a position paper.

- Position Paper: A position paper presents results that are preliminary or that simply require few pages to describe. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics. The acceptance of a position paper is restricted to the categories of "short paper" or "poster".


Authors of accepted papers must guarantee that their papers will be presented at the conference.

Accepted papers will have to be formatted according to the SECRYPT format, which is described at
http://secrypt.icete.org/paper_formats.asp, and adhere to the page limit of 10 pages (for full papers), 6 pages (for short papers), and 4 pages (for posters).


Submitted papers will be subject to a double-blind review process. All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.

A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book.

Additionally, a short list of papers presented at the conference, will also be selected for publication in the CEPIS UPGRADE Journal and in the REICIS Journal.

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index, INSPEC, DBLP and EI.
Best paper awards will be bestowed at the conference closing session.
All papers presented at the conference venue will also be available at SciTePress' Digital Library (http://www.scitepress.org/DigitalLibrary).


CONFERENCE CO-CHAIRS
Mohammad S. Obaidat, Monmouth University, U.S.A.
Jose Sevillano, University of Seville, Spain

PROGRAM CO-CHAIRS
Pierangela Samarati, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain


PROGRAM COMMITTEE
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Giampaolo Bella, Università Di Catania, Italy
Marina Blanton, University of Notre Dame, United States
Carlo Blundo, Università di Salerno, Italy
Gil Pino Caballero, Universidad De La Laguna, Spain
David Chadwick, University of Kent, United Kingdom
Jorge Cuellar, Siemens AG, Germany
Frédéric Cuppens, Ecole Nationale De Télécommunications De Bretagne, France
Paolo D'arco, University of Salerno, Italy
Jorge Davila, UPM, Spain
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita' degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Amparo Fúster-Sabater, C.S.I.C., Spain
R. M. Gasca, University of Seville, Spain
Antonio Gómez-skarmeta, University of Murcia, Spain
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Ragib Hasan, Johns Hopkins University, United States
Jordi Herrera, UAB, Spain
Jiankun Hu, RMIT University, Australia
Michael Huth, Imperial College London, United Kingdom
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser Katzenbeisser, Technische Universität Darmstadt, Germany
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China

(list not yet complete)



This call for papers and additional information about the conference can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs: secrypt2011@unimi.it

Related Resources

JMC 2022   JOURNAL OF MATHEMATICAL CRYPTOLOGY
CSP--Scopus, Ei 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)--Ei Compendex, Scopus
CSP 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)
SECRYPT 2022   19th International Conference on Security and Cryptography
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
SI on AdCTI 2022   Special Issue on Advances in Cyber Threat Intelligence 2022, Security and Communication Networks, Wiley & Hindawi
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
ACNS 2023   21st International Conference on Applied Cryptography and Network Security
MDA AI&PR 2023   18th International Conference on Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security,
SVC 2023   4th International Conference on Signal Processing, VLSI Design & Communication Systems