International Conference on Security and Cryptography
SECRYPT 2011 – International Conference on Security and Cryptography: July 18-21, Seville, Spain
July 18-21     Seville, Spain
Call for Papers

SECRYPT is sponsored by INSTICC – Institute for Systems and Technologies of Information, Control and Communication
Scope

The purpose of SECRYPT 2011, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication. Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.
Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics that can be listed, as indicated below.

Ideas on how to analyze and approach security problems by combining information and communication technologies with the appropriate theoretical work including information theory and communication theory, either in the scope of R&D projects, engineering or business applications, are welcome. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of SECRYPT, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and poster sessions.
The best papers will be selected to appear in a book to be published by Springer-Verlag.

Special sessions, case studies and tutorials dedicated to technical/scientific topics related to the main conference are also envisaged: researchers interested in organizing a special session, or companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat.

Conference Topics

› Access Control
› Applied Cryptography
› Biometrics Security and Privacy
› Critical Infrastructure Protection
› Data Integrity
› Data Protection
› Database Security and Privacy
› Digital Forensics
› Digital Rights Management
› Ethical and Legal Implications of Security and Privacy
› Human Factors and Human Behaviour Recognition Techniques
› Identification, Authentication and Non-repudiation
› Identity Management
› Information Hiding
› Information Systems Auditing
› Insider Threats and Countermeasures
› Intellectual Property Protection
› Intrusion Detection & Prevention
› Management of Computing Security
› Network Security
› Organizational Security Policies
› Peer-to-Peer Security
› Personal Data Protection for Information Systems
› Privacy
› Reliability and Dependability
› Risk Assessment
› Secure Cloud Computing
› Secure Software Development Methodologies
› Security and Privacy in Mobile Systems
› Security and Privacy in Complex Systems
› Security and Privacy in IT Outsourcing
› Security and Privacy in Location-based Services
› Security and Privacy in Pervasive/Ubiquitous Computing
› Security and Privacy in Social Networks
› Security and Privacy in Web Sevices
› Security and Privacy Policies
› Security Area Control
› Security Deployment
› Security Engineering
› Security for Grid Computing
› Security in Distributed Systems
› Security Information Systems Architecture and Design and Security Patterns
› Security Management
› Security Metrics and Measurement
› Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
› Security Verification and Validation
› Sensor and Mobile Ad Hoc Network Security
› Service and Systems Design and QoS Network Security
› Software Security
› Trust Management and Reputation Systems
› Ubiquitous Computing Security
› Wireless Network Security (WiFi, WiMAX, WiMedia and others)

Keynote Speakers

Vincenzo Piuri, Università degli Studi di Milano, Italy
Enrique Cabello, University Rey Juan Carlos, Spain

Publications

All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).
A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book.
A short list of papers presented at the conference will be selected for publication of extended and revised versions in CEPIS UPGRADE Journal.
A short list of papers presented at the conference will be selected for publication of extended and revised versions in REICIS.
The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index, INSPEC, DBLP and EI.

Program Co-chairs

Pierangela Samarati, Università degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain

Program Committee

Claudio Ardagna, Universita` degli Studi di Milano, Italy
Josang Audun, Oslo University, Norway
Ken Barker, University of Calgary, Canada
Giampaolo Bella, Università Di Catania, Italy
Marina Blanton, University of Notre Dame, United States
Carlo Blundo, Università di Salerno, Italy
Gil Pino Caballero, Universidad De La Laguna, Spain
David Chadwick, University of Kent, United Kingdom
Jorge Cuellar, Siemens AG, Germany
Frédéric Cuppens, Ecole Nationale De Télécommunications De Bretagne, France
Paolo D'arco, University of Salerno, Italy
Jorge Davila, Universidad Politécnica de Madrid, Spain
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita' degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Amparo Fúster-Sabater, C.S.I.C., Spain
R. M. Gasca, Escuela Técnica Superior Ingeniería Informática. Universidad de Sevilla, Spain
Antonio Gómez-skarmeta, University of Murcia, Spain
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Ragib Hasan, Johns Hopkins University, United States
Jordi Herrera, UAB, Spain
Jiankun Hu, University of New South Wales at the Australian Defence Force Academy, Australia
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser Katzenbeisser, Technische Universität Darmstadt, Germany
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero, Pontifical Catholic University, Brazil
Jorge Guajardo Merchan, Philips Research Eindhoven, Netherlands
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Marco Casassa Mont, Hewlett-Packard Laboratories, United Kingdom
David Naccache, Ecole Normale Superieure, France
Juan Gonzalez Nieto, Queensland University of Technology, Australia
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSecurity Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Universita` degli Studi di Bergamo, Italy
Rene Peralta, NIST, United States
Günther Pernul, University of Regensburg, Germany
Alessandro Piva, Universita`degli Studi di Firenze, Italy
Joachim Posegga, Inst. of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Carlos Ribeiro, IST, Portugal
Miguel Soriano, Upc, Spain
Neeraj Suri, Technische Universität Darmstadt, Germany
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, University of York, United Kingdom
Marianthi Theoharidou, AUEB, Greece
Sabrina de Capitani di Vimercati, Università degli Studi di Milano, Italy
Lingyu Wang, Concordia University, Canada
Yang Xiang, Central Queensland University, Australia
Alec Yasinsac, University of South Alabama, United States
Nicola Zannone, Eindhoven University of Technology, Netherlands
Justin Zhan, North Carolina A&T State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore
Bo Zhu, Concordia University, Canada