posted by system || 8539 views || tracked by 25 users: [display]

SECRYPT 2013 : 10th International Conference on Security and Cryptography


Conference Series : International Conference on Security and Cryptography
When Jul 29, 2013 - Jul 31, 2013
Where Reykjavík, Iceland
Submission Deadline Mar 18, 2013
Notification Due May 6, 2013
Final Version Due May 20, 2013
Categories    security   cryptography   information retrieval

Call For Papers

*** Deadline extended to March 18, 2013 ***


10th International Conference on Security and Cryptography (SECRYPT 2013)
Reykjavik, Iceland, July 29-31, 2013

SECRYPT is an annual international conference covering research in
information and communication security. The 10th International
Conference on Security and Cryptography (SECRYPT 2013) will be held in
Rome, Italy. The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography. Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged. The conference topics include, but are not limited

Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at

Two categories of papers can be submitted:

- Full Paper: A regular paper presents a work where the research is
completed or almost finished. Authors of regular submitted papers
will indicate at the time of submission whether they would like
their paper to also be considered for publication as a position
- Position Paper: A position paper presents results that are
preliminary or that simply require few pages to describe. A position
paper may be a short report and discussion of ideas, facts,
situations, methods, procedures or results of scientific research
(bibliographic, experimental, theoretical, or other) focused on one
of the conference topics. The acceptance of a position paper is
restricted to the categories of "short paper" or "poster".

Submitted papers must be formatted according to the SECRYPT format
(apart for blinding authors), which is described at Submission page limit is
12 pages for regular paper and 6 pages for position papers. Accepted
papers will be subject to the limit of: 12 pages (for full papers), 6
pages (for short papers or posters). Submitted papers
will be subject to a double-blind review process. All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings. A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book. Authors of
accepted papers/posters must guarantee that their papers will be
presented at the conference.

Full Paper submission: March 18, 2013 (11:59 p.m. American Samoa time) [extended]
Authors Notification (full papers): May 6, 2013

Mohammad S. Obaidat, Monmouth University, U.S.A.

Pierangela Samarati, Universita' degli Studi di Milano, Italy


Alessandro Armando, Fondazione Bruno Kessler, Italy
Carlos Blanco Bueno, University of Cantabria, Spain
Carlo Blundo, Universita' di Salerno, Italy
Michael Brenner, Leibniz Universitat Hannover, Germany
Marco Casassa-Mont, Hewlett-Packard Laboratories, UK
David Chadwick, University of Kent, UK
Frederic Cuppens, Telecom Bretagne, France
Nora Cuppens, Telecom Bretagne, France
Reza Curtmola, New Jersey Institute of Tech, USA
Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre, Italy
Tassos Dimitriou, Athens Information Technology, Greece
Josep Domingo-Ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, USA
Alberto Ferrante, University of Lugano, Switzerland
Pep Ll. Ferrer, Balearic Islands University, Spain
William Fitzgerald, University College Cork, Ireland
Sara Foresti, Universita' degli Studi di Milano, Italy
Steven Furnell, University of Plymouth, UK
Joaquin Garcia Alfaro, Telecom Bretagne, France
David Garcia Rosado, Universidad de Castilla-La Mancha, Spain
Mark Gondree, Naval Postgraduate School, USA
Dimitris Gritzalis, AUEB, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Yong Guan, Iowa State University, USA
Sokratis Katsikas, University of Piraeus, Greece
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China
Adam J. Lee, University of Pittsburgh, USA
Patrick Lee, Chinese University of Hong Kong, Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, USA
Antonio Lioy, Politecnico di Torino, Italy
Giovanni Livraga, Universita' degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Haibing Lu, Santa Clara University, USA
Emil Lupu, Imperial College, UK
Olivier Markowitch, Universite' Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero, Federal University of Technology, Brazil
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Chris Mitchell, Royal Holloway, University of London, UK
Atsuko Miyaji, Japan Advanced Institute of Science and Technology, Japan
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, Universita' degli Studi di Bergamo, Italy
Joon Park, Syracuse University, USA
Gunther Pernul, University of Regensburg, Germany
Joachim Posegga, Institute of IT Security and Security Law, Germany
Silvio Ranise, Fondazione Bruno Kessler, Italy
Kui Ren, Illinois Institute of Technology, USA
Nicolas Sklavos, Technological Educational Institute of Patras, Greece
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Vincen Torra, Artificial Intelligence Research Institute, Catalonia
Jaideep Vaidya, Rutgers State University of New Jersey, USA
Luca Vigano', Universita' di Verona, Italy
Lingyu Wang, Concordia University, Canada
Ping Wang, University of Central Florida, USA
Haining Wang, The College of William and Mary, USA
Cong Wang, City University of Hong Kong, Hong Kong
Alec Yasinsac, University of South Alabama, USA
Meng Yu, VCU Engineering, USA
Lei Zhang, Google Inc., USA
Jianying Zhou, Institute for Infocomm Research, Singapore

This call for papers and additional information about the conference
can be found at

For any questions, please contact the program chairs:

Related Resources

ECIR 2023   45th European Conference on Information Retrieval
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
CSP--Scopus, Ei 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)--Ei Compendex, Scopus
CSP 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)
ACNS 2023   21st International Conference on Applied Cryptography and Network Security
AIAA 2022   12th International Conference on Artificial Intelligence, Soft Computing and Applications
SECRYPT 2022   19th International Conference on Security and Cryptography
CRYPIS 2023   11th International Conference on Cryptography and Information Security
ICSS 2022   8th International Conference on Software Security