Banner
Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents

Call for Papers

SECRYPT is sponsored by INSTICC – Institute for Systems and Technologies of Information, Control and Communication

SCOPE

The purpose of SECRYPT 2012, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication. Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.
Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics that can be listed, as indicated below.

Ideas on how to analyze and approach security problems by combining information and communication technologies with the appropriate theoretical work including information theory and communication theory, either in the scope of R&D projects, engineering or business applications, are welcome. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of SECRYPT, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and poster sessions.
The best papers will be selected to appear in a book to be published by Springer-Verlag.

Special sessions, case studies and tutorials dedicated to technical/scientific topics related to the main conference are also envisaged: researchers interested in organizing a special session, or companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat.

CONFERENCE TOPICS


  • Access Control
  • Applied Cryptography
  • Authentication
  • Biometrics Security and Privacy
  • Critical Infrastructure Protection
  • Data Integrity
  • Data Protection
  • Database Security and Privacy
  • Digital Forensics
  • Digital Rights Management
  • Ethical and Legal Implications of Security and Privacy
  • Formal Methods for Security
  • Human Factors and Human Behaviour Recognition Techniques
  • Identification, Authentication and Non-Repudiation
  • Identity Management
  • Information Hiding
  • Information Systems Auditing
  • Insider Threats and Countermeasures
  • Intellectual Property Protection
  • Intrusion Detection & Prevention
  • Management of Computing Security
  • Network Security
  • Organizational Security Policies
  • Peer-to-Peer Security
  • Personal Data Protection for Information Systems
  • Privacy
  • Privacy Enhancing Technologies
  • Reliability and Dependability
  • Risk Assessment
  • Secure Cloud Computing
  • Secure Software Development Methodologies
  • Security Protocols
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Complex Systems
  • Security and Privacy in IT Outsourcing
  • Security and Privacy in Location-Based Services
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Social Networks
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Metrics and Measurement
  • Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, Etc.)
  • Security Verification and Validation
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Trust Management and Reputation Systems
  • Ubiquitous Computing Security
  • Wireless Network Security (WiFi, WiMAX, WiMedia and Others)

ICETE KEYNOTE SPEAKERS

Venu GovindarajuUniversity at Buffalo, United States
Sushil JajodiaGeorge Mason University Fairfax, United States
Andreas HolzingerHuman-Centered AI Lab, Institute for Medical Informatics and Statistics, Medical University Graz, Austria
Geoffrey Charles FoxIndiana University, United States
Luis M. CorreiaIt/deec, IST/IT-Technical University of Lisbon, Portugal

PAPER SUBMISSION

Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, authors are kindly requested to produce and provide the paper WITHOUT any reference to any of the authors, including the authors’ personal details, the acknowledgments section of the paper and any other reference that may disclose the authors’ identity.

Only original papers should be submitted. Authors are advised to read INSTICC's ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.

Authors can submit their work in the form of a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas. All papers must be submitted through the online submission platform PRIMORIS and should follow the instructions and templates that can be found under Guidelines and Templates. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.

PUBLICATIONS

All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on digital support.
SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every paper on our digital library is given a DOI (Digital Object Identifier).
A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book.
A short list of papers presented at the conference will be selected for publication of extended and revised versions in the Journal of Information
Processing Systems (JIPS).

A short list of papers presented at the conference will be selected for publication of extended and revised
versions in the Journal of Networks (JNW).

The proceedings will be submitted for indexation by .

SECRETARIAT

SECRYPT Secretariat
Address: Av. D. Manuel I, 27A, 2º esq.
             2910-595 Setubal - Portugal
Tel.: +351 265 520 185
Fax: +44 203 014 5432
e-mail: secrypt.secretariat@insticc.org
Web: https://secrypt.scitevents.org

Program Chair
Pierangela Samarati, Universita' degli Studi di Milano, Italy
Program Co-Chairs
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore

PROGRAM COMMITTEE MEMBERS

Claudio Ardagna, Dipartimento di Informatica, Universita degli Studi di Milano, Italy
Ken Barker, Computer Science, University of Calgary, Canada
Carlo Blundo, Dipartimento di Scienze Aziendali - Management & Innovation Systems/DISA-MIS, Università di Salerno, Italy
David Chadwick, Computing Laboratory, University of Kent, United Kingdom
Aldar Chan, Cryptography and Security, Institute for Infocomm Research, Singapore
Ee-Chien Chang, Computer Science, School of Computing, National University of Singapore, Singapore
Yingying Chen, Stevens Institute of Technology, United States
Cheng-Kang Chu, Institute for Infocomm Research, Singapore
Marco Cova, University of Birmingham, United Kingdom
Jorge Cuellar, CT T DE IT1,, Germany
Frederic Cuppens, Networks, Security and Multimedia Department, TELECOM Bretagne, France
Reza Curtmola, Computer Science, New Jersey Institute of Technology, United States
Ricardo Dahab, Theory of Computation, University of Campinas (UNICAMP), Brazil
Sabrina De Capitani Di Vimercati, Informatica, Università degli Studi di Milano, Italy
Roberto Di Pietro, Matematica, Universita' di Roma Tre, Italy
Tassos Dimitriou, Computer Technology Institute, Greece and Kuwait University, Kuwait
Josep Domingo-Ferrer, Department of Computer Engineering and Maths, Rovira i Virgili University, Spain
Eduardo B. Fernandez, Computer Science And Eng., Florida Atlantic University, United States
Eduardo Fernández-Medina, Computer Sciences, University of Castilla-La Mancha, Spain
Alberto Ferrante, IDSIA, Faculty Of Informatics, Università della Svizzera Italiana, Switzerland
Josep-Lluis Ferrer-Gomila, Computer Science Department, Balearic Islands University, Spain
Simone Fischer-Hübner, Computer Science, Karlstad University, Sweden
Sara Foresti, Università degli Studi di Milano, Italy
Keith Frikken, Computer Science and Software Engineering, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Mark Gondree, Sonoma State University, United States
Dimitris Gritzalis, Informatics, Athens University of Economics & Business, Greece
Xinyi Huang, School of Mathematics and Computer Science, Fujian Normal University, China
Michael Huth, Computing, Imperial College London, United Kingdom
Cynthia Irvine, Computer Science, Naval Postgraduate School, United States
Sokratis Katsikas, Dept. of Information Security and Communication Technology, Norwegian University of Science and Technology, Norway
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Shinsaku Kiyomoto, KDDI Research Inc., Japan
Costas Lambrinoudakis, Department of Digital Systems, University of Piraeus, Greece
Bo Lang, Independent Researcher, China
Loukas Lazos, Electrical and Computer Engineering, University of Arizona, United States
Patrick C. Lee, Chinese University of Hong Kong, Hong Kong
Adam J. Lee, Computer Science, University of Pittsburgh, United States
Albert Levi, Computer Science And Engineering, Sabanci University, Turkey
Ming Li, Utah State University, United States
Jiguo Li, College of Computer and Cyber Security, Fujian Normal University, China
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, Computer Science, University of Malaga, Spain
Emil Lupu, Independent Researcher, United Kingdom
Luigi Mancini, Informatica, University of Rome La Sapienza, Italy
Olivier Markowitch, Computer Science, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero, Computer Science, UFPR - Federal University of Paraná, Brazil
Chris Mitchell, ISG, Royal Holloway, University of London, United Kingdom
Atsuko Miyaji, School Of Information Science, Japan Advaned Institute of Science and Technology, Japan
Marco Casassa Mont, , United Kingdom
David Naccache, Ecole Normale Superieure, France
Guevara Noubir, Northeastern University, United States
Eiji Okamoto, Dept. of Risk Engineering, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, Faculty of Engineering, University of Bergamo, Italy
Gerardo Pelosi, Electronics, Information and Bioengineering (DEIB), Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Radha Poovendran, EE Department, University of Washington, United States
Joachim Posegga, Computer Science and Mathematics, Institute of IT Security and Security Law, Germany
Jian Ren, Michigan State University, United States
Kui Ren, State University of New York at Buffalo, United States
Sushmita Ruj, Electrical Engineering and Computer Science, University of Ottawa, Canada
Gokay Saldamli, MIS department, Bogazici University, Turkey
Martin Schläffer, Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Austria
Miguel Soriano, Telematics Engineering,, Spain
Neeraj Suri, Technische Universität Darmstadt, Germany
Willy Susilo, School of Computer Science and Software Engineering, University of Wollongong, Australia
Chiu Tan, Temple University, United States
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Lingyu Wang, Concordia Institute for Information Systems Engineering, Concordia University, Canada
Guilin Wang, SCSSE, University of Wollongong, Australia
Xinyuan F. Wang, Computer Science, George Mason University, United States
Haining Wang, The College of William and Mary, United States
Osman Yagan, Cybersecurity Lab, Carnegie Mellon University, United States
Danfeng Yao, Independent Researcher, United States
Alec F. Yasinsac, Independent Researcher, United States
Shucheng Yu, Computer Science, University of Arkansas at Little Rock, United States
Wensheng Zhang, Iowa State University, United States
Futai Zhang, School of Computer Science and Technology, Nanjing Normal University, China
Wen T. Zhu, 19A Yuquan Road, Graduate University of Chinese Academy of Sciences, China

footer