Nov 30

International Conference on Security and Cryptography – SECRYPT 2012

CALL FOR PAPERS

International Conference on Security and Cryptography – SECRYPT 2012

Website: http://www.secrypt.icete.org/
July 24 – 27, 2012
Rome, Italy

In cooperation with IEICE (The Institute of Electronics, Information and Communication Engineers)
and SWIM (Special Interest Group on Software Interprise Modeling)

Sponsored by INSTICC
INSTICC is member of WfMC (Workflow Management Coalition)


Important Deadlines: 
Regular Paper submission: March 5, 2012
Authors Notification (regular papers): April 24, 2012
Final Regular Paper Submission and Registration: May 7, 2012

###############################################################


Dear ,

We would like to draw your attention to the International Conference on Security and Cryptography (SECRYPT-2012), which has currently an open call for papers. 

Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.

SECRYPT 2012 is part of the International Joint Conference on e-Business and Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int'l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int'l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int'l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int'l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int'l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

These six concurrent conferences are held in parallel and registration to one warrants delegates to attend all six.

ICETE is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 409 submissions, 12% were accepted as full papers, 16% were presented as short papers and 13% as posters.

The conference program features a number of Keynote Lectures to be delivered by distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
(list not yet complete)
http://www.icete.org/KeynoteSpeakers.aspx

Submitted papers will be subject to a double-blind review process. All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support. DEZO
A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book. 
Additionally, a short list of papers presented at the conference, will also be selected for publication in the Journal of Information Processing Systems (JIPS).
Furthermore, a short list of papers presented at the conference, will be selected for publication in a special issue of JNW – Journal of Networks

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and Elsevier Index (EI).
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.


CONFERENCE TOPICS
   * Access Control
   * Applied Cryptography
   * Biometrics Security and Privacy
   * Critical Infrastructure Protection
   * Data Integrity
   * Data Protection
   * Database Security and Privacy
   * Digital Forensics
   * Digital Rights Management
   * Ethical and Legal Implications of Security and Privacy
   * Human Factors and Human Behaviour Recognition Techniques
   * Identification, Authentication and Non-repudiation
   * Identity Management
   * Information Hiding
   * Information Systems Auditing
   * Insider Threats and Countermeasures
   * Intellectual Property Protection
   * Intrusion Detection & Prevention
   * Management of Computing Security
   * Network Security
   * Organizational Security Policies
   * Peer-to-Peer Security
   * Personal Data Protection for Information Systems
   * Privacy
   * Reliability and Dependability
   * Risk Assessment
   * Secure Cloud Computing
   * Secure Software Development Methodologies
   * Security and Privacy in Mobile Systems
   * Security and privacy in Complex Systems
   * Security and Privacy in IT Outsourcing
   * Security and Privacy in Location-based Services
   * Security and Privacy in Pervasive/Ubiquitous Computing
   * Security and Privacy in Social Networks
   * Security and Privacy in Web Services
   * Security and Privacy Policies
   * Security Area Control
   * Security Deployment
   * Security Engineering
   * Security for Grid Computing
   * Security in Distributed Systems
   * Security Information Systems Architecture and Design and Security Patterns
   * Security Management
   * Security Metrics and Measurement
   * Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
   * Security Verification and Validation
   * Sensor and Mobile Ad Hoc Network Security
   * Service and Systems Design and QoS Network Security
   * Software Security
   * Trust management and Reputation Systems
   * Ubiquitous Computing Security
   * Wireless Network Security (WiFi, WiMAX, WiMedia and others)


CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita degli Studi di Milano, Italy

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore 


Please check further details at the conference web site (http://www.secrypt.icete.org). 

Should you have any question or suggestion please don't hesitate to contact me.


Kind regards,
Monica Saramago
SECRYPT Secretariat

Av. D. Manuel I, 27A 2.esq.
2910-595 Setubal, Portugal
Tel.: +351 265 520 185
Fax: +44 203 014 5432
Email: secrypt.secretariat@insticc.org
Web: http://www.secrypt.icete.org