| |||||||||||||||
RECSI 2012 : XII Spanish Meeting on Criptology and Information Security | |||||||||||||||
Link: http://recsi2012.mondragon.edu/en?set_language=en | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The Information Society is a reality involving principal actors: Companies, Government, Scientific and Education Agents and Society as a whole. Scientific actors provide knowledge, that, with the support of the Government and a transformation to technology by Companies, must respond to the demand of the society in short, medium and long term. Computer Security is needed to ensure the correct use of Information Technology and Communication by Society.
The Spanish Meeting on Cryptology and Information Security (RECSI) is the Spanish reference scientific Conference in the field. Every two years the most important national researchers attend this event, and renowned foreign researchers are invited. In the meeting recent advances in security will be presented to the main agents of the Information Society, in order to provide a forum for exchanging ideas, increase knowledge and share experiences in the field of Security. For this reason, Mondragon University is organizing the RECSI in order to bring together most of the research groups and the most important companies that work in: design of methods to protect the information (cryptography), analyze these methods to discover vulnerabilities (cryptanalysis), and create and analyze methods for the protection of computer systems and communication networks (Information Security). In September 2012, its twelfth edition will take place in Donostia-San Sebastián. Previous editions were held in Palma de Mallorca (1991), Madrid (1992), Barcelona (1994), Valladolid (1996), Torremolinos (1998), Santa Cruz de Tenerife (2000), Oviedo (2002), Leganés (2004), Barcelona (2006), Salamanca (2008) and Tarragona (2010). All papers about information security are relevant, and selected topics include: Cryptography and cryptoanalysis Authentication and digital signatures Cryptography Applications Privacy and Anonymity Watermarking and steganography Access Control Intrusion detection and traps Malware Analysis Spam detection Security in Social Networks Security in Embedded Systems Computer Forensics |
|