posted by user: PericlePerazzo || 5414 views || tracked by 7 users: [display]

SECRYPT 2013 : 10th International Conference on Security and Cryptography (position papers)

FacebookTwitterLinkedInGoogle

Link: http://secrypt.icete.org
 
When Jul 29, 2013 - Jul 31, 2013
Where Reykjavik, Iceland
Submission Deadline Apr 24, 2013
Notification Due May 16, 2013
Categories    security   cryptography   privacy
 

Call For Papers

*** Position papers deadline - April 24, 2013 ***


CALL FOR POSITION PAPERS

************************************************************************
10th International Conference on Security and Cryptography (SECRYPT 2013)
Reykjavik, Iceland, July 29-31, 2013
http://secrypt.icete.org
************************************************************************

The International Conference on Security and Cryptography
(SECRYPT 2013 - http://secrypt.icete.org), to be held in Reykjavik, Iceland,
July 29-31, 2013, is now welcoming the submission of position papers whose
deadline is scheduled for next April 24.

Position papers can be 4-6 pages and should be submitted in anonymous form.
Submissions will be subject to a double-blind review process. Accepted position
papers will appear in the conference proceedings, under an ISBN reference, on
paper and on CD-ROM support. The proceedings will be submitted for indexation
by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP
and Elsevier Index (EI). All papers presented at the conference venue will be
available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/).
SciTePress is member of CrossRef (http://www.crossref.org/).

The conference seeks submissions from academia, industry, and government
presenting novel research on all theoretical and practical aspects of data
protection, privacy, security, and cryptography. Papers describing the
application of security technology, the implementation of systems, and lessons
learned are also encouraged. The conference topics include, but are not
limited to:

Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security


POSITION PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Submitted papers must be formatted according to the SECRYPT format
(apart for blinding authors), which is described at
http://secrypt.icete.org/GuidelinesTemplates.aspx. Submitted papers
will be subject to a double-blind review process. All submissions
should be anonymized. All accepted papers will be published in
the conference proceedings. Authors of
accepted papers must guarantee that their papers will be
presented at the conference.


IMPORTANT DATES
Position Paper submission: April 24, 2013 (11:59 p.m. American Samoa time)
Authors Notification: May 16, 2013

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy


PROGRAM COMMITTEE

Alessandro Armando, Fondazione Bruno Kessler, Italy
Carlos Blanco Bueno, University of Cantabria, Spain
Carlo Blundo, Universita' di Salerno, Italy
Andrey Bogdanov, Technical University of Denmark, Denmark
Michael Brenner, Leibniz Universitat Hannover, Germany
Marco Casassa-Mont, Hewlett-Packard Laboratories, UK
David Chadwick, University of Kent, UK
Frederic Cuppens, Telecom Bretagne, France
Nora Cuppens, Telecom Bretagne, France
Reza Curtmola, New Jersey Institute of Tech, USA
Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre, Italy
Tassos Dimitriou, Athens Information Technology, Greece
Josep Domingo-Ferrer, Rovira I Virgili University of Tarragona, Spain
Ruggero Donida Labati, Universita' degli Studi di Milano, Italy
Eduardo B. Fernandez, Florida Atlantic University, USA
Alberto Ferrante, University of Lugano, Switzerland
Pep Ll. Ferrer, Balearic Islands University, Spain
William Fitzgerald, University College Cork, Ireland
Sara Foresti, Universita' degli Studi di Milano, Italy
Steven Furnell, University of Plymouth, UK
Joaquin Garcia Alfaro, Telecom Bretagne, France
David Garcia Rosado, Universidad de Castilla-La Mancha, Spain
Mark Gondree, Naval Postgraduate School, USA
Dimitris Gritzalis, AUEB, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Yong Guan, Iowa State University, USA
Sokratis Katsikas, University of Piraeus, Greece
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China
Adam J. Lee, University of Pittsburgh, USA
Patrick Lee, Chinese University of Hong Kong, Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, USA
Antonio Lioy, Politecnico di Torino, Italy
Giovanni Livraga, Universita' degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Haibing Lu, Santa Clara University, USA
Emil Lupu, Imperial College, UK
Olivier Markowitch, Universite' Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero, Federal University of Technology, Brazil
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Alessandro Mei, Sapienza University, Rome, Italy
Chris Mitchell, Royal Holloway, University of London, UK
Atsuko Miyaji, Japan Advanced Institute of Science and Technology, Japan
David Naccache, Ecole Normale Superieure, France
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, Universita' degli Studi di Bergamo, Italy
Joon Park, Syracuse University, USA
Gunther Pernul, University of Regensburg, Germany
Joachim Posegga, Institute of IT Security and Security Law, Germany
Silvio Ranise, Fondazione Bruno Kessler, Italy
Kui Ren, Kui Ren, University at Buffalo, State University of New York, USA
Nicolas Sklavos, Technological Educational Institute of Patras, Greece
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Vincen Torra, Artificial Intelligence Research Institute, Catalonia
Jaideep Vaidya, Rutgers State University of New Jersey, USA
Luca Vigano', Universita' di Verona, Italy
Lingyu Wang, Concordia University, Canada
Ping Wang, University of Central Florida, USA
Haining Wang, The College of William and Mary, USA
Cong Wang, City University of Hong Kong, Hong Kong
Xinyuan Wang, George Mason University, USA
Alec Yasinsac, University of South Alabama, USA
Meng Yu, VCU Engineering, USA
Lei Zhang, Google Inc., USA
Jianying Zhou, Institute for Infocomm Research, Singapore


This call for position papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chair:
secrypt2013@unimi.it

Related Resources

SECRYPT 2025   22nd International Conference on Security and Cryptography
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SEAS 2025   14th International Conference on Software Engineering and Applications
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
IJCSITY 2024   International Journal of Computational Science and Information Technology
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)