posted by user: insticc || 15080 views || tracked by 10 users: [display]

SECRYPT 2020 : 17th International Conference on Security and Cryptography

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Security and Cryptography
 
Link: http://www.secrypt.icete.org
 
When Jul 8, 2020 - Jul 10, 2020
Where Online Streaming
Submission Deadline Mar 31, 2020
Notification Due Apr 15, 2020
Final Version Due Apr 29, 2020
Categories    security   information security   cryptography   computer security
 

Call For Papers

CALL FOR PAPERS
17th International Conference on Security and Cryptography SECRYPT

website: http://www.secrypt.icete.org

July 8 - 10, 2020 [Online Streaming]


Proceedings will be submitted for indexation by: DBLP, Thomson Reuters, EI, SCOPUS, Semantic Scholar, Google Scholar and Microsoft Academic.


IMPORTANT DATES:

Regular Paper Submission: February 14, 2020
Authors Notification (regular papers): April 15, 2020
Final Regular Paper Submission and Registration: April 29, 2020


Position Paper Submission: March 31, 2020
Authors Notification (position papers): May 7, 2020
Final Regular Paper Submission and Registration: May 20, 2020

Scope:
SECRYPT is an annual international conference covering research in information and communication security. The 17th International Conference on Security and Cryptography (SECRYPT 2020) will be held in Lieusant, Paris on 8-10 July 2020. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged.

Conference Topics:
Area 1: SECRYPT - International Conference on Security and Cryptography
- Access Control
- Applied Cryptography
- Biometrics Security and Privacy
- Critical Infrastructure Protection
- Data Integrity
- Data Protection
- Database Security and Privacy
- Digital Forensics
- Digital Rights Management
- Ethical and Legal Implications of Security and Privacy
- Formal Methods for Security
- Human Factors and Human Behavior Recognition Techniques
- Identification, Authentication and Non-Repudiation
- Identity Management
- Information Hiding
- Information Systems Auditing
- Insider Threats and Countermeasures
- Intellectual Property Protection
- Intrusion Detection & Prevention
- Management of Computing Security
- Network Security
- Organizational Security Policies
- Peer-to-Peer Security
- Personal Data Protection for Information Systems
- Privacy
- Privacy Enhancing Technologies
- Reliability and Dependability
- Risk Assessment
- Secure Software Development Methodologies
- Security and Privacy for Big Data
- Security and Privacy in Complex Systems
- Security and Privacy in Crowdsourcing
- Security and Privacy in IT Outsourcing
- Security and Privacy in Location-Based Services
- Security and Privacy in Mobile Systems
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in Smart Grids
- Security and Privacy in Social Networks
- Security and Privacy in the Cloud
- Security and Privacy in Web Services
- Security and Privacy Policies
- Security Area Control
- Security Deployment
- Security Engineering
- Security in Distributed Systems
- Security Information Systems Architecture
- Security Management
- Security Metrics and Measurement
- Security Protocols
- Security Requirements
- Security Verification and Validation
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and QoS Network Security
- Software Security
- Trust Management and Reputation Systems
- Ubiquitous Computing Security
- Wireless Network Security


SECRYPT KEYNOTE LECTURE
Henderik Proper, Public Research Centre - Henri Tudor, Luxembourg
Jaime Lloret Mauri, Universidad Politecnica de Valencia, Spain
Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), United States
Moti Yung, Columbia University, United States
Ingemar Johansson Cox, University of Copenhagen, United Kingdom


SECRYPT CONFERENCE CO-CHAIRS:
Mohammad Obaidat, University of Jordan, Jordan and Nazarbayev University, Kazakhstan
Jalel Ben-Othman, University of Paris 13, France

SECRYPT PROGRAM CO-CHAIRS:
Pierangela Samarati, Università degli Studi di Milano, Italy
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy

PROGRAM COMMITTEE
http://www.secrypt.icete.org/ProgramCommittee.aspx

SECRYPT Secretariat
Address: Avenida de S. Francisco Xavier, Lote 7 Cv. C
Tel: +351 265 520 185
Fax: +351 265 520 186
Web: http://www.secrypt.icete.org
e-mail: secrypt.secretariat@insticc.org

Related Resources

DFTS 2026   IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems
CAIJ 2026   Computer Applications: An International Journal
IFSP--EI 2026   2026 The 6th International Forum on Signal Processing (IFSP 2026)
EI/Scopus-PCDI 2026   2026 International Conference on Perception, Control and Decision Intelligence-EI/Scopus
CVIT 2026   SPIE--2026 7th International Conference on Computer Vision and Information Technology (CVIT 2026)
IJAIT 2026   International Journal of Advanced Information Technology
CRBL 2026   6th International Conference on Cryptography and Blockchain
IJCCSA 2026   International Journal on Cloud Computing: Services and Architecture
ICCGV 2026   SPIE--2026 9th International Conference on Computer Graphics and Virtuality (ICCGV 2026)
IJCIS 2026   International Journal on Cryptography and Information Security