| |||||||||||||
SECRYPT 2013 : 10th International Conference on Security and Cryptography (position papers) | |||||||||||||
Link: http://secrypt.icete.org | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
*** Position papers deadline - April 24, 2013 ***
CALL FOR POSITION PAPERS ************************************************************************ 10th International Conference on Security and Cryptography (SECRYPT 2013) Reykjavik, Iceland, July 29-31, 2013 http://secrypt.icete.org ************************************************************************ The International Conference on Security and Cryptography (SECRYPT 2013 - http://secrypt.icete.org), to be held in Reykjavik, Iceland, July 29-31, 2013, is now welcoming the submission of position papers whose deadline is scheduled for next April 24. Position papers can be 4-6 pages and should be submitted in anonymous form. Submissions will be subject to a double-blind review process. Accepted position papers will appear in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support. The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and Elsevier Index (EI). All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/). The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. The conference topics include, but are not limited to: Access Control Applied Cryptography Biometrics Security and Privacy Critical Infrastructure Protection Data Integrity Data Protection Database Security and Privacy Digital Forensics Digital Rights Management Ethical and Legal Implications of Security and Privacy Formal Methods for Security Human Factors and Human Behavior Recognition Techniques Identification, Authentication and Non-repudiation Identity Management Information Hiding Information Systems Auditing Insider Threats and Countermeasures Intellectual Property Protection Intrusion Detection & Prevention Management of Computing Security Network Security Organizational Security Policies Peer-to-Peer Security Personal Data Protection for Information Systems Privacy Privacy Enhancing Technologies Reliability and Dependability Risk Assessment Secure Software Development Methodologies Security and privacy in Complex Systems Security and Privacy in Crowdsourcing Security and Privacy in IT Outsourcing Security and Privacy in Location-based Services Security and Privacy in Mobile Systems Security and Privacy in Pervasive/Ubiquitous Computing Security and Privacy in Smart Grids Security and Privacy in Social Networks Security and Privacy in the Cloud Security and Privacy in Web Services Security and Privacy Policies Security Area Control Security Deployment Security Engineering Security in Distributed Systems Security Information Systems Architecture Security Management Security Metrics and Measurement Security Protocols Security requirements Security Verification and Validation Sensor and Mobile Ad Hoc Network Security Service and Systems Design and QoS Network Security Software Security Trust management and Reputation Systems Ubiquitous Computing Security Wireless Network Security POSITION PAPER SUBMISSIONS Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions are to be made to the submission web site at http://www.insticc.org/Primoris. Submitted papers must be formatted according to the SECRYPT format (apart for blinding authors), which is described at http://secrypt.icete.org/GuidelinesTemplates.aspx. Submitted papers will be subject to a double-blind review process. All submissions should be anonymized. All accepted papers will be published in the conference proceedings. Authors of accepted papers must guarantee that their papers will be presented at the conference. IMPORTANT DATES Position Paper submission: April 24, 2013 (11:59 p.m. American Samoa time) Authors Notification: May 16, 2013 CONFERENCE CHAIR Mohammad S. Obaidat, Monmouth University, U.S.A. PROGRAM CHAIR Pierangela Samarati, Universita' degli Studi di Milano, Italy PROGRAM COMMITTEE Alessandro Armando, Fondazione Bruno Kessler, Italy Carlos Blanco Bueno, University of Cantabria, Spain Carlo Blundo, Universita' di Salerno, Italy Andrey Bogdanov, Technical University of Denmark, Denmark Michael Brenner, Leibniz Universitat Hannover, Germany Marco Casassa-Mont, Hewlett-Packard Laboratories, UK David Chadwick, University of Kent, UK Frederic Cuppens, Telecom Bretagne, France Nora Cuppens, Telecom Bretagne, France Reza Curtmola, New Jersey Institute of Tech, USA Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy Roberto Di Pietro, Universita' di Roma Tre, Italy Tassos Dimitriou, Athens Information Technology, Greece Josep Domingo-Ferrer, Rovira I Virgili University of Tarragona, Spain Ruggero Donida Labati, Universita' degli Studi di Milano, Italy Eduardo B. Fernandez, Florida Atlantic University, USA Alberto Ferrante, University of Lugano, Switzerland Pep Ll. Ferrer, Balearic Islands University, Spain William Fitzgerald, University College Cork, Ireland Sara Foresti, Universita' degli Studi di Milano, Italy Steven Furnell, University of Plymouth, UK Joaquin Garcia Alfaro, Telecom Bretagne, France David Garcia Rosado, Universidad de Castilla-La Mancha, Spain Mark Gondree, Naval Postgraduate School, USA Dimitris Gritzalis, AUEB, Greece Stefanos Gritzalis, University of the Aegean, Greece Yong Guan, Iowa State University, USA Sokratis Katsikas, University of Piraeus, Greece Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan Costas Lambrinoudakis, University of Piraeus, Greece Bo Lang, Beijing University of Aeronautics and Astronautics, China Adam J. Lee, University of Pittsburgh, USA Patrick Lee, Chinese University of Hong Kong, Hong Kong Albert Levi, Sabanci University, Turkey Jiguo Li, Hohai University, China Ming Li, Utah State University, USA Antonio Lioy, Politecnico di Torino, Italy Giovanni Livraga, Universita' degli Studi di Milano, Italy Javier Lopez, University of Malaga, Spain Haibing Lu, Santa Clara University, USA Emil Lupu, Imperial College, UK Olivier Markowitch, Universite' Libre de Bruxelles, Belgium Vashek Matyas, Masaryk University, Czech Republic Carlos Maziero, Federal University of Technology, Brazil Wojciech Mazurczyk, Warsaw University of Technology, Poland Alessandro Mei, Sapienza University, Rome, Italy Chris Mitchell, Royal Holloway, University of London, UK Atsuko Miyaji, Japan Advanced Institute of Science and Technology, Japan David Naccache, Ecole Normale Superieure, France Eiji Okamoto, University of Tsukuba, Japan Rolf Oppliger, eSECURITY Technologies, Switzerland Stefano Paraboschi, Universita' degli Studi di Bergamo, Italy Joon Park, Syracuse University, USA Gunther Pernul, University of Regensburg, Germany Joachim Posegga, Institute of IT Security and Security Law, Germany Silvio Ranise, Fondazione Bruno Kessler, Italy Kui Ren, Kui Ren, University at Buffalo, State University of New York, USA Nicolas Sklavos, Technological Educational Institute of Patras, Greece Willy Susilo, University of Wollongong, Australia Juan Tapiador, Universidad Carlos III de Madrid, Spain Vincen Torra, Artificial Intelligence Research Institute, Catalonia Jaideep Vaidya, Rutgers State University of New Jersey, USA Luca Vigano', Universita' di Verona, Italy Lingyu Wang, Concordia University, Canada Ping Wang, University of Central Florida, USA Haining Wang, The College of William and Mary, USA Cong Wang, City University of Hong Kong, Hong Kong Xinyuan Wang, George Mason University, USA Alec Yasinsac, University of South Alabama, USA Meng Yu, VCU Engineering, USA Lei Zhang, Google Inc., USA Jianying Zhou, Institute for Infocomm Research, Singapore This call for position papers and additional information about the conference can be found at http://secrypt.icete.org/ For any questions, please contact the program chair: secrypt2013@unimi.it |
|