Banner
Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents

Call for Papers

SECRYPT is sponsored by INSTICC – Institute for Systems and Technologies of Information, Control and Communication

SCOPE

SECRYPT is an annual international conference covering research in information and communication security. The International Conference on Security and Cryptography (SECRYPT) seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and applied cryptography. Note that while applied cryptography papers are welcome, pure cryptography papers are out of scope for the conference. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged.

CONFERENCE TOPICS


  • Access Control
  • Anonymity
  • AI-based Security and Privacy
  • Applied Cryptography
  • Biometrics Security and Privacy
  • Blockchains Security and Privacy
  • Critical Infrastructure Protection
  • Data Integrity
  • Data Protection
  • Database Security and Privacy
  • Digital Forensics
  • Distributed Systems Security
  • Ethical and Legal Implications of Security and Privacy
  • Formal Methods for Security
  • Human Factors and Human Behavior Recognition Techniques
  • Identification, Authentication and Non-Repudiation
  • Identity Management
  • Information Hiding
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • IoT Security and Privacy
  • Machine Learning Security and Privacy
  • Machine learning applications to data security and privacy
  • Misinformation, disinformation, and fake news
  • Network Security
  • Organizational Security Policies
  • Peer-to-Peer Security
  • Personal Data Protection for Information Systems
  • Privacy
  • Privacy Enhancing Technologies
  • Reliability and Dependability
  • Risk Assessment
  • Secure Software Development Methodologies
  • Security and Privacy for Big Data
  • Security and Privacy in Complex Systems
  • Security and Privacy in Crowdsourcing
  • Security and Privacy in IT Outsourcing
  • Security and Privacy in Location-Based Services
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Smart Grids
  • Security and Privacy in Social Networks
  • Security and Privacy in the Cloud
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Engineering
  • Security in Distributed Systems
  • Security Information Systems Architecture
  • Security Management
  • Security Metrics and Measurement
  • Security Protocols
  • Security usability
  • Security Verification and Validation
  • Sensor and Mobile Ad Hoc Network Security
  • Software Security
  • Trust Management and Reputation Systems
  • Ubiquitous Computing Security
  • Web Security and Privacy
  • Wireless Network Security

SECRYPT KEYNOTE SPEAKERS

SECRYPT 2024 will have several invited keynote speakers, who are internationally recognized experts in their areas. Their names are not yet confirmed.

PAPER SUBMISSION

Authors can submit their work in the form of a complete paper or an abstract, but please note that accepted abstracts are presented but not published in the proceedings of the conference. Complete papers can be submitted as a Regular Paper, representing completed and validated research, or as a Position Paper, portraying a short report of work in progress or an arguable opinion about an issue discussing ideas, facts, situations, methods, procedures or results of scientific research focused on one of the conference topic areas.

Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, authors are kindly requested to produce and provide the paper WITHOUT any reference to any of the authors, including the authors’ personal details, the acknowledgments section of the paper and any other reference that may disclose the authors’ identity.

When submitting a complete paper please note that only original papers should be submitted. Authors are advised to read INSTICC's ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.

All papers must be submitted through the online submission platform PRIMORIS and should follow the instructions and templates that can be found under Guidelines and Templates. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.

PUBLICATIONS

All accepted complete papers will be published in the conference proceedings, under an ISBN reference, on paper and on digital support.
SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every paper on our digital library is given a DOI (Digital Object Identifier).
The proceedings will be submitted for indexation by SCOPUS, Google Scholar, DBLP, Semantic Scholar, EI and Web of Science / Conference Proceedings Citation Index.

IMPORTANT DATES

Conference Date: 8 - 10 July, 2024

Paper Submission: March 6, 2024 (expired)
Authors Notification:
April 15, 2024
Camera Ready and Registration:
April 30, 2024

Paper Submission: April 8, 2024 (expired)
Authors Notification:
May 8, 2024
Camera Ready and Registration:
May 21, 2024

Late-Breaking

Paper Submission: April 30, 2024
Authors Notification:
May 21, 2024
Camera Ready and Registration:
May 28, 2024

Workshops
Workshop Proposal: March 1, 2024 (expired)

Doctoral Consortium
Paper Submission: May 8, 2024
Authors Notification: May 22, 2024
Camera Ready and Registration: May 31, 2024

Special Sessions
Special Session Proposal: March 1, 2024 (expired)

Tutorials
Tutorial Proposal: May 27, 2024

Demos
Demo Proposal: May 27, 2024

Panels
Panel Proposal: May 27, 2024

Abstracts
Abstract Submission: May 8, 2024
Authors Notification: May 22, 2024
Camera Ready and Registration: May 31, 2024

SECRETARIAT

SECRYPT Secretariat
Address: Avenida de S. Francisco Xavier, Lote 7 Cv. C
             2900-616 Setubal - Portugal
Tel.: +351 265 520 185
Fax: +351 265 520 186
e-mail: secrypt.secretariat@insticc.org
Web: https://secrypt.scitevents.org

VENUE

The conference will take place at the campus of ESEO Dijon which is located in the beautiful and historical city of Dijon in France. Dijon is considered to be one of the most beautiful historical towns in France, with its remarkable architectural heritage shaped by history

The half-timbered houses, the Romanesque and Gothic churches and the 17th- and 18th-century private mansions majestically highlight the Medieval streets of the former capital of the Dukes of Burgundy.

SECRYPT CONFERENCE CHAIR

Pierangela SamaratiUniversità degli Studi di Milano, Italy

PROGRAM CHAIR

Sabrina De Capitani Di VimercatiInformatica, Università degli Studi di Milano, Italy

PROGRAM COMMITTEE MEMBERS

Esma Aïmeur, Department Of Computer Science And Operations Research (diro), University of Montreal, Canada
Massimiliano Albanese, Center for Secure Information Systems, George Mason University, United States
Jorge Blasco Alis, Universidad Politécnica de Madrid, Spain
Peter Amthor, Fakultät für Informatik und Automatisierung, Technische Universität Ilmenau, Germany
Muhammad Rizwan Asghar, Department of Computer Science, University of Surrey, United Kingdom
Elias Athanasopoulos, Computer Science, University of Cyprus, Cyprus
Marijke Coetzee, School of Computer Science and Information Systems, North-West University, South Africa
Nora Cuppens, GIGL, Polytechnique de Montréal, Canada
Frederic Cuppens, Polytechnique de Montréal, Canada
Jun Dai, Worcester Polytechnic Institute, United States
Giovanni Di Crescenzo, Peraton Labs, United States
Mario Di Raimondo, Dipartimento di Matematica, Università of Catania, Italy
Vasiliki Diamantopoulou, University of the Aegean, Greece
Daniel Dinu, Intel, United States
Ruggero Donida Labati, Department of Computer Science, Università degli Studi di Milano, Italy
Mohammed Erradi, Computer Networks, ENSIAS, Mohammed V University in Rabat, Morocco
Csilla Farkas, Computer Science and Engineering, University of South Carolina, United States
Alberto Ferrante, IDSIA, Faculty Of Informatics, Università della Svizzera Italiana, Switzerland
Anna Lisa Ferrara, University of Molise, Italy
Josep-Lluis Ferrer-Gomila, Computer Science Department, Balearic Islands University, Spain
Sara Foresti, Università degli Studi di Milano, Italy
Angelo Genovese, Department of Computer Science, Università degli Studi di Milano, Italy
Roberto Gonzalez, NEC Labs Europe, Spain
Dimitris Gritzalis, Informatics, Athens University of Economics & Business, Greece
Tiago Heinrich, Max Planck Institute for Informatics, Germany
Christos Kalloniatis, Cultural Technology and Communication, University of the Aegean, Greece
Katarzyna Kapusta, Thales SIX, France
Shinsaku Kiyomoto, KDDI Research Inc., Japan
Albert Levi, Computer Science And Engineering, Sabanci University, Turkey
Giovanni Livraga, Universita degli Studi di Milano, Italy
Lukas Malina, Brno University of Technology, Czech Republic
Evangelos Markatos, ICS, Forth, Greece
Amir Masoumzadeh, University at Albany, United States
Sjouke Mauw, FSTC/CSC, University of Luxembourg, Luxembourg
David Megias, Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya, Spain
Gerard Memmi, Telecom Paris, France
Weizhi Meng, Computer Science, Technical University of Denmark, Denmark
Francesco Mercaldo, National Research Council of Italy (CNR), Italy
Tim Muller, University of Nottingham, United Kingdom
Guillermo Navarro-Arribas, Universitat Autonoma de Barcelona, Spain
Rolf Oppliger, eSECURITY Technologies, Switzerland
Brajendra Panda, Electrical Engineering and Computer Science, University of Arkansas, United States
Stefano Paraboschi, Faculty of Engineering, University of Bergamo, Italy
Miguel Pardal, Computer Science and Engineering, Instituto Superior Técnico, Universidade de Lisboa, Portugal
Joon Park, School of Information Studies, Syracuse University, United States
Tran Viet Xuan Phuong, Dept of CS, University of Arkansas at Little Rock, United States
Silvio Ranise, CIT, Fondazione Bruno Kessler, Italy
Rodrigo Roman, University of Malaga, Spain
Marco Rosa, SAP Security Research, France
Vicenc Torra, Umea University, Sweden
Anselme Tueno, SAP Security Research, SAP SE, Germany
Roopa Vishwanathan, Dept of Computer Science, New Mexico State University, United States
Isabel Wagner, University of Basel, Switzerland
Lingyu Wang, Concordia Institute for Information Systems Engineering, Concordia University, Canada

(list not yet complete)

footer