posted by system || 6006 views || tracked by 25 users: [display]

SECRYPT 2013 : 10th International Conference on Security and Cryptography

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Security and Cryptography
 
Link: http://www.secrypt.icete.org
 
When Jul 29, 2013 - Jul 31, 2013
Where Reykjavík, Iceland
Submission Deadline Mar 18, 2013
Notification Due May 6, 2013
Final Version Due May 20, 2013
Categories    security   cryptography   information retrieval
 

Call For Papers

*** Deadline extended to March 18, 2013 ***


CALL FOR PAPERS

************************************************************************
10th International Conference on Security and Cryptography (SECRYPT 2013)
Reykjavik, Iceland, July 29-31, 2013
http://secrypt.icete.org
************************************************************************

SECRYPT is an annual international conference covering research in
information and communication security. The 10th International
Conference on Security and Cryptography (SECRYPT 2013) will be held in
Rome, Italy. The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography. Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged. The conference topics include, but are not limited
to:

Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security


PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted:

- Full Paper: A regular paper presents a work where the research is
completed or almost finished. Authors of regular submitted papers
will indicate at the time of submission whether they would like
their paper to also be considered for publication as a position
paper.
- Position Paper: A position paper presents results that are
preliminary or that simply require few pages to describe. A position
paper may be a short report and discussion of ideas, facts,
situations, methods, procedures or results of scientific research
(bibliographic, experimental, theoretical, or other) focused on one
of the conference topics. The acceptance of a position paper is
restricted to the categories of "short paper" or "poster".

Submitted papers must be formatted according to the SECRYPT format
(apart for blinding authors), which is described at
http://secrypt.icete.org/paper_formats.asp. Submission page limit is
12 pages for regular paper and 6 pages for position papers. Accepted
papers will be subject to the limit of: 12 pages (for full papers), 6
pages (for short papers or posters). Submitted papers
will be subject to a double-blind review process. All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings. A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book. Authors of
accepted papers/posters must guarantee that their papers will be
presented at the conference.


IMPORTANT DATES
Full Paper submission: March 18, 2013 (11:59 p.m. American Samoa time) [extended]
Authors Notification (full papers): May 6, 2013

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy


PROGRAM COMMITTEE

Alessandro Armando, Fondazione Bruno Kessler, Italy
Carlos Blanco Bueno, University of Cantabria, Spain
Carlo Blundo, Universita' di Salerno, Italy
Michael Brenner, Leibniz Universitat Hannover, Germany
Marco Casassa-Mont, Hewlett-Packard Laboratories, UK
David Chadwick, University of Kent, UK
Frederic Cuppens, Telecom Bretagne, France
Nora Cuppens, Telecom Bretagne, France
Reza Curtmola, New Jersey Institute of Tech, USA
Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre, Italy
Tassos Dimitriou, Athens Information Technology, Greece
Josep Domingo-Ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, USA
Alberto Ferrante, University of Lugano, Switzerland
Pep Ll. Ferrer, Balearic Islands University, Spain
William Fitzgerald, University College Cork, Ireland
Sara Foresti, Universita' degli Studi di Milano, Italy
Steven Furnell, University of Plymouth, UK
Joaquin Garcia Alfaro, Telecom Bretagne, France
David Garcia Rosado, Universidad de Castilla-La Mancha, Spain
Mark Gondree, Naval Postgraduate School, USA
Dimitris Gritzalis, AUEB, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Yong Guan, Iowa State University, USA
Sokratis Katsikas, University of Piraeus, Greece
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China
Adam J. Lee, University of Pittsburgh, USA
Patrick Lee, Chinese University of Hong Kong, Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, USA
Antonio Lioy, Politecnico di Torino, Italy
Giovanni Livraga, Universita' degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Haibing Lu, Santa Clara University, USA
Emil Lupu, Imperial College, UK
Olivier Markowitch, Universite' Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero, Federal University of Technology, Brazil
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Chris Mitchell, Royal Holloway, University of London, UK
Atsuko Miyaji, Japan Advanced Institute of Science and Technology, Japan
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, Universita' degli Studi di Bergamo, Italy
Joon Park, Syracuse University, USA
Gunther Pernul, University of Regensburg, Germany
Joachim Posegga, Institute of IT Security and Security Law, Germany
Silvio Ranise, Fondazione Bruno Kessler, Italy
Kui Ren, Illinois Institute of Technology, USA
Nicolas Sklavos, Technological Educational Institute of Patras, Greece
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Vincen Torra, Artificial Intelligence Research Institute, Catalonia
Jaideep Vaidya, Rutgers State University of New Jersey, USA
Luca Vigano', Universita' di Verona, Italy
Lingyu Wang, Concordia University, Canada
Ping Wang, University of Central Florida, USA
Haining Wang, The College of William and Mary, USA
Cong Wang, City University of Hong Kong, Hong Kong
Alec Yasinsac, University of South Alabama, USA
Meng Yu, VCU Engineering, USA
Lei Zhang, Google Inc., USA
Jianying Zhou, Institute for Infocomm Research, Singapore


This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs:
secrypt2013@unimi.it

Related Resources

SECRYPT 2017   14th International Conference on Security and Cryptography
SIGIR 2018   International ACM SIGIR Conference on Research and Development in Information Retrieval
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
SECRYPT 2018   15th International Conference on Security and Cryptography
IJMSA 2017   International Journal of Modeling, Simulation and Applications
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
BSidesMunich 2018   BSides Munich 2018 Security Conference
USENIX-Security 2018   27th USENIX Security Symposium
IJE 2017   International Journal of Education (IJE)
ACNS 2018   Applied Cryptography and Network Security