posted by user: glivraga || 1960 views || tracked by 5 users: [display]

SECRYPT 2014 : 11th International Conference on Security and Cryptography

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Security and Cryptography
 
Link: http://secrypt.icete.org
 
When Aug 28, 2014 - Aug 30, 2014
Where Vienna, Austria
Submission Deadline Apr 29, 2014
Notification Due Jun 16, 2014
Final Version Due Jun 30, 2014
 

Call For Papers

*** Deadline approaching - April 29, 2014 ***


CALL FOR PAPERS

************************************************************************
11th International Conference on Security and Cryptography (SECRYPT 2014)
Vienna, Austria, August 28-30, 2014
http://secrypt.icete.org
************************************************************************


SECRYPT is an annual international conference covering research in
information and communication security. The 11th International
Conference on Security and Cryptography (SECRYPT 2014) will be held in
Vienna, Austria on 28-30 August 2014. The conference seeks submissions
from academia, industry, and government presenting novel research on
all theoretical and practical aspects of data protection, privacy,
security, and cryptography. Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged. The conference topics include, but are not limited to:

Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security


PAPER SUBMISSIONS
Submitted papers must be in English and must not substantially overlap
with papers that have been published or that are simultaneously submitted
to a journal or a conference with proceedings. Submissions are to be
made to the submission web site at http://www.insticc.org/Primoris.

Papers can be submitted as REGULAR or POSITION papers.

- REGULAR Paper: Regular papers present work where research is completed.
They can be up to 12 pages.
Authors of regular submitted papers will indicate at the time of
submission whether they would like their paper to also be considered for
publication as a position paper.

- POSITION Paper: A position paper presents results that are preliminary
or that simply require fewer pages to describe. A position paper may be
a short report and discussion of ideas, facts, situations, methods,
procedures or results of scientific research (theoretical or experimental)
on one of the conference topics. The acceptance of a position paper is
restricted to the categories of "short paper"

Submitted papers must be formatted according to the SECRYPT format,
which is described at http://secrypt.icete.org/GuidelinesTemplates.aspx.

Submission page limit is 12 pages for regular papers and 8 pages for
position papers. Accepted papers will be subject to the limit of: 12 pages
for full papers, 8 pages for short papers with oral presentation, and 6
pages for short paper with poster presentation. Authors of accepted papers
must guarantee that their papers will be presented at the conference. All
papers presented at the conference will be published in the conference
proceedings and in the digital library. A short list of presented papers
will be selected so that revised and extended versions of these papers
will be published by Springer-Verlag in a CCIS Series book.


IMPORTANT DATES
Regular and Position Papers
- Paper Submission: April 29, 2014 (23:59 American Samoa time) [extended]
- Authors Notification: June 16, 2014
- Camera Ready and Registration: June 30, 2014

Second call for Position Papers only:
- Paper Submission: May 23, 2014
- Authors Notification: June 27, 2014
- Camera Ready and Registration: July 9, 2014


PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy


PROGRAM COMMITTEE

Ehab Al-Shaer, UNC Charlotte, USA
Alessandro Armando, FBK, Italy
Prithvi Bisht, University of Illinois at Chicago, Unites States
Carlo Blundo, Università di Salerno, Italy
Andrey Bogdanov, Technical University of Denmark, Denmark
Frederic Cuppens, TELECOM Bretagne, France
Nora Cuppens-Boulahia, TELECOM, France
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre, Italy
Tassos Dimitriou, Athens Information Technology, Greece
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Ruggero Donida Labati, Università degli Studi di Milano, Italy
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
William Fitzgerald, EMC Information Systems International, Ireland
Sara Foresti, Universita' degli Studi di Milano, Italy
Steven Furnell, Plymouth University, United Kingdom
Joaquin Garcia-Alfaro, Institut Mines-Telecom, TELECOM SudParis, France
Mark Gondree, Naval Postgraduate School, United States
Dimitris Gritzalis, AUEB, Greece
Stefanos Gritzalis, University of the Aegean , Greece
Sokratis Katsikas, University of Piraeus, Greece
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Yong Guan, Iowa State University, United States
Kostas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China
Patrick P. C. Lee , Chinese University of Hong Kong, Hong Kong
Adam J. Lee , University of Pittsburgh, United States
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Haibing Lu, Santa Clara University, United States
Emil Lupu, Imperial College, United Kingdom
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero, UTFPR - Federal University of Technology - Paraná state, Brazil
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
David Naccache, Ecole Normale Superieure, France
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Joon Park, Syracuse University, United States
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Joachim Posegga, University of Passau, Germany
Silvio Ranise, Fondazione Bruno Kessler, Italy
Kui Ren, State University of New York at Buffalo, United States
Nicolas Sklavos, Technological Educational Institute of Patras, Greece
Alessandro Sorniotti, IBM Research, Switzerland
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Vicenc Torra, IIIA-CSIC, Spain
Jaideep Vaidya, Rutgers Business School, United States
Luca Viganò, King’s College London, United Kingdom
Xinyuan (Frank) Wang, George Mason University , United States
Haining Wang, The College of William and Mary, United States
Ping Wang, Symantec Corporation, United States
Cong Wang, City University of Hong Kong, Hong Kong
Lingyu Wang, Concordia University, Canada
Edgar Weippl, Vienna University of Technology, Austria
Alec Yasinsac, University of South Alabama, United States
Meng Yu, Virginia Commonwealth University, United States
Lei Zhang, Thomson Reuters, United States


This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chair:
secrypt2014@unimi.it

Related Resources

SECRYPT 2017   14th International Conference on Security and Cryptography
GameSec 2017   GameSec 2017 : Conference on Decision and Game Theory for Security
ESORICS 2017   Twenty-second European Symposium on Research in Computer Security
ACISP 2017   Australasian Conference on Information Security and Privacy
FC 2017   Financial Cryptography and Data Security 2017
ACNS 2017   The 15th International Conference on Applied Cryptography and Network Security
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
ICCNS - Ei 2017   ACM--2017 the 7th International Conference on Communication and Network Security (ICCNS 2017)--SCOPUS, Ei Compendex