| |||||||||||||||
SECRYPT 2012 : 9th International Conference on Security and Cryptography | |||||||||||||||
Link: http://secrypt.icete.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
***Deadline extended to April 26, 2012***
CALL FOR PAPERS ************************************************************************ 9th International Conference on Security and Cryptography (SECRYPT 2012) Rome, Italy, July 24-27, 2012 http://secrypt.icete.org ************************************************************************ SECRYPT is an annual international conference covering research in information and communication security. The 9th International Conference on Security and Cryptography (SECRYPT 2012) will be held in Rome, Italy. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. The conference topics include, but are not limited to: - Access Control - Applied Cryptography - Authentication - Biometrics Security and Privacy - Critical Infrastructure Protection - Data Integrity - Data Protection - Database Security and Privacy - Digital Forensics - Digital Rights Management - Ethical and Legal Implications of Security and Privacy - Formal Methods for Security - Human Factors and Human Behaviour Recognition Techniques - Identification, Authentication and Non-repudiation - Identity Management - Information Hiding - Information Systems Auditing - Insider Threats and Countermeasures - Intellectual Property Protection - Intrusion Detection & Prevention - Management of Computing Security - Network Security - Organizational Security Policies - Peer-to-Peer Security - Personal Data Protection for Information Systems - Privacy - Privacy Enhancing Technologies - Reliability and Dependability - Risk Assessment - Secure Cloud Computing - Secure Software Development Methodologies - Security Protocols - Security and Privacy in Mobile Systems - Security and Privacy in Complex Systems - Security and Privacy in IT Outsourcing - Security and Privacy in Location-based Services - Security and Privacy in Pervasive/Ubiquitous Computing - Security and Privacy in Social Networks - Security and Privacy in Web Services - Security and Privacy Policies - Security Area Control - Security Deployment - Security Engineering - Security for Grid Computing - Security in Distributed Systems - Security Information Systems Architecture and Design and Security Patterns - Security Management - Security Metrics and Measurement - Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.) - Security Verification and Validation - Sensor and Mobile Ad Hoc Network Security - Service and Systems Design and QoS Network Security - Software Security - Trust Management and Reputation Systems - Ubiquitous Computing Security - Wireless Network Security (WiFi, WiMAX, WiMedia and others) PAPER SUBMISSIONS Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions are to be made to the submission web site at http://www.insticc.org/Primoris. Two categories of papers can be submitted: - Full Paper: A full paper presents a work where the research is completed or almost finished. Authors of regular submitted papers will indicate at the time of submission whether they would like their paper to also be considered for publication as a position paper. - Position Paper: A position paper presents results that are preliminary or that simply require few pages to describe. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures, or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics. The acceptance of a position paper is restricted to the categories of "short paper" or "poster". Submitted papers must be formatted according to the SECRYPT format (with the exception that authors should be blinded in the submission), which is described at http://secrypt.icete.org/paper_formats.asp. Submission page limit is 10 pages for full paper and 6 pages for position papers. Accepted papers will be subject to the limit of: 10 pages (for full papers), 6 pages (for short papers), and 4 pages (for posters). Submitted papers will be subject to a double-blind review process. All submissions should be anonymized. All accepted papers/posters will be published in the conference proceedings. A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book. Authors of accepted papers/posters must guarantee that their papers/posters will be presented at the conference. IMPORTANT DATES Paper Submission: April 27, 2012 Authors Notification: May 21, 2012 Final Paper Submission and Registration: June 1, 2012 CONFERENCE CHAIR Mohammad S. Obaidat, Monmouth University, U.S.A. PROGRAM CHAIR Pierangela Samarati, Universita' degli Studi di Milano, Italy PROGRAM CO-CHAIRS Wenjing Lou, Virginia Polytechnic Institute and State University, United States Jianying Zhou, Institute For Infocomm Research, Singapore PROGRAM COMMITTEE Claudio Ardagna, Universita` degli Studi di Milano, Italy Ken Barker, University of Calgary, Canada Carlo Blundo, Università di Salerno,, Italy David Chadwick, University of Kent ,United Kingdom Aldar Chan, Institute for Infocomm Researc,h Singapore Ee-chien Chang, National University of Singapore Singapore Yingying Chen, Stevens Institute of Technology,, United States Cheng-Kang Chu, Institute for Infocomm Research, Singapore Marco Cova, University of Birmingham,, United Kingdom Jorge Cuellar, Siemens AG,, Germany Frédéric Cuppens, Ecole Nationale de Télécommunications de Bretagne,, France Reza Curtmola, New Jersey Institute of Tech,, United States Ricardo Dahab, University of Campinas (UNICAMP) ,, Brazil Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy Roberto Di Pietro, Universita' di Roma Tre,, Italy Tassos Dimitriou, Athens Information Technology,, Greece Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain Eduardo B. Fernandez, Florida Atlantic University, United States Eduardo Fernández-medina, University of Castilla-La Mancha, Spain Alberto Ferrante, University of Lugano, Switzerland Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain Simone Fischer-Hübner, Karlstad University, Sweden Sara Foresti, Universita' degli Studi di Milano, Italy Keith Frikken, Miami University of Ohio, United States Steven Furnell, University of Plymouth, United Kingdom Mark Gondree, Naval Postgraduate School, United States Dimitris Gritzalis, AUEB, Greece Yong Guan, Iowa State University, United States Xinyi Huang, Fujian Normal University, China Michael Huth, Imperial College London, United Kingdom Cynthia Irvine, Naval Postgraduate School, United States Sokratis Katsikas, University of Piraeus, Greece Stefan Katzenbeisser, Technische Universität Darmstadt, Germany Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan Costas Lambrinoudakis, University of Piraeus, Greece Bo Lang Beijing, University of Aeronautics and Astronautics, China Loukas Lazos, University of Arizona, United States Adam J. Lee, University of Pittsburgh, United States Patrick Lee, Chinese University of Hong Kong Hong Kong Albert Levi, Sabanci University, Turkey Jiguo Li, Hohai University, China Ming Li, Utah State University, United States Giovanni Livraga, Universita degli Studi di Milano, Italy Javier Lopez, University of Malaga, Spain Emil Lupu, Imperial College, United Kingdom Luigi Mancini, University of Rome La Sapienza, Italy Olivier Markowitch, Université Libre de Bruxelles, Belgium Vashek Matyas, Masaryk University Czech Republic Carlos Maziero, UTFPR - Federal University of Technology - Paraná state, Brazil Chris Mitchell, Royal Holloway, University of London, United Kingdom Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan Marco Casassa-Mont, Hewlett-Packard Laboratories, United Kingdom David Naccache, Ecole Normale Superieure, France Guevara Noubir, Northeastern University, United States Eiji Okamoto, University of Tsukuba, Japan Rolf Oppliger, eSECURITY Technologies, Switzerland Stefano Paraboschi, University of Bergamo, Italy Gerardo Pelosi, Politecnico di Milano, Italy Günther Pernul, University of Regensburg, Germany Raphael C.-w. Phan, Loughborough University, United Kingdom Radha Poovendran, University of Washington, United States Joachim Posegga, Institute of IT Security and Security Law, Germany Kui Ren, Illinois Institute of Technology, United States Jian Ren, Michigan State University, United States Sushmita Ruj, University of Ottawa Canada Gokay Saldamli Bogazici, University MIS department, Turkey Martin Schläffer, Graz University of Technology, Austria Miguel Soriano, UPC, Spain Cosimo Stallo, University of Rome Tor Vergata, Italy Neeraj Suri, Technische Universität Darmstadt, Germany Willy Susilo, University of Wollongong, Australia Chiu Tan, Temple University, United States Juan Tapiador, Universidad Carlos III de Madrid, Spain Wen-guey Tzeng, National Chiao Tung University, Taiwan Guilin Wang, University of Wollongong, Australia Xinyuan (Frank) Wang, George Mason University , United States Haining Wang, The College of William and Mary, United States Lingyu Wang, Concordia University Canada Osman Yagan, Carnegie Mellon University, United States Danfeng Yao, Virginia Tech, United States Alec Yasinsac, University of South Alabama, United States Shucheng Yu, University of Arkansas at Little Rock, United States Wensheng Zhang, Iowa State University, United States Futai Zhang, Nanjing Normal University, China Wen Tao Zhu, Graduate University of Chinese Academy of Sciences, China This call for papers and additional information about the conference can be found at http://secrypt.icete.org/ For any questions, please contact the program chairs: secrypt2012@unimi.it ----------------------------------------------- SECRYPT 2012 is part of the International Joint Conference on e-Business and Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely: - DCNET: Int'l Conference on Data Communication Networking (http://www.dcnet.icete.org) - ICE-B: Int'l Conference on e-Business (http://www.ice-b.icete.org) - OPTICS: Int'l Conference on Optical Communication Systems (http://www.optics.icete.org) - SIGMAP: Int'l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org) - WINSYS: Int'l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org) The conference program features a number of Keynote Lectures to be delivered by distinguished world-class researchers, namely: - Venu Govindaraju, University at Buffalo, United States - Sushil Jajodia, George Mason University Fairfax, United States - Andreas Holzinger, Medical University Graz, Austria - Geoffrey Charles Fox, Indiana University, United States http://www.icete.org/KeynoteSpeakers.aspx ----------------------------------------------- |
|