Tag: ecrypt 2

Feb 01

9th International Conference on Security and Cryptography (SECRYPT 2012)

CALL FOR PAPERS

************************************************************************
9th International Conference on Security and Cryptography (SECRYPT 2012)
Rome, Italy, July 24-27, 2012
http://secrypt.icete.org
************************************************************************

SECRYPT is an annual international conference covering research in
information and communication security.  The 9th International
Conference on Security and Cryptography (SECRYPT 2012) will be held in
Rome, Italy.  The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography.  Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged.  The conference topics include, but are not limited
to:

– Access Control
– Applied Cryptography
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Network Security
– Organizational Security Policies
– Peer-to-Peer Security
– Personal Data Protection for Information Systems
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Social Networks
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security
 Patterns
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal
 Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security (WiFi, WiMAX, WiMedia and others) 

PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings.  All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted: 

– Full Paper: A full paper presents a work where the research is
 completed or almost finished.  Authors of regular submitted papers
 will indicate at the time of submission whether they would like
 their paper to also be considered for publication as a position
 paper.
– Position Paper: A position paper presents results that are
 preliminary or that simply require few pages to describe. A position
 paper may be a short report and discussion of ideas, facts,
 situations, methods, procedures, or results of scientific research
 (bibliographic, experimental, theoretical, or other) focused on one
 of the conference topics. The acceptance of a position paper is
 restricted to the categories of "short paper" or "poster".

Submitted papers must be formatted according to the SECRYPT format
(with the exception that authors should be blinded in the submission), 
which is described at http://secrypt.icete.org/paper_formats.asp.  
Submission page limit is 10 pages for full paper and 6 pages for position papers. 
Accepted papers will be subject to the limit of: 10 pages (for full papers), 6
pages (for short papers), and 4 pages (for posters).  Submitted papers
will be subject to a double-blind review process.  All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings.  A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book.  Authors of
accepted papers/posters must guarantee that their papers/posters will be
presented at the conference.


IMPORTANT DATES
Full Paper submission: March 5, 2012
Authors Notification (full papers): May 4, 2012 
Final Full Paper Submission and Registration: May 14, 2012

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy 

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore


PROGRAM COMMITTEE
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Carlo Blundo, Università di Salerno,, Italy
David Chadwick, University of Kent ,United Kingdom
Aldar Chan, Institute for Infocomm Researc,h Singapore
Ee-chien Chang, National University of Singapore Singapore
Yingying Chen, Stevens Institute of Technology,, United States
Cheng-Kang Chu, Institute for Infocomm Research, Singapore
Marco Cova, University of Birmingham,, United Kingdom
Jorge Cuellar, Siemens AG,, Germany
Frédéric Cuppens, Ecole Nationale de Télécommunications de Bretagne,, France
Reza Curtmola,  New Jersey Institute of Tech,, United States
Ricardo Dahab, University of Campinas (UNICAMP) ,, Brazil
Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre,, Italy
Tassos Dimitriou, Athens Information Technology,, Greece
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Universita' degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Mark Gondree, Naval Postgraduate School, United States
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Xinyi Huang, Fujian Normal University, China
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang Beijing, University of Aeronautics and Astronautics, China
Loukas Lazos,  University of Arizona, United States
Adam J. Lee,  University of Pittsburgh, United States
Patrick Lee,  Chinese University of Hong Kong Hong Kong
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Emil Lupu, Imperial College, United Kingdom
Luigi Mancini, University of Rome La Sapienza, Italy
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University Czech Republic
Carlos Maziero, UTFPR – Federal University of Technology – Paraná state, Brazil
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Marco Casassa-Mont, Hewlett-Packard Laboratories, United Kingdom
David Naccache, Ecole Normale Superieure, France
Guevara Noubir,  Northeastern University, United States
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Raphael C.-w. Phan, Loughborough University, United Kingdom
Radha Poovendran,  University of Washington, United States
Joachim Posegga, Institute of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Jian Ren, Michigan State University, United States
Sushmita Ruj, University of Ottawa Canada
Gokay Saldamli Bogazici, University MIS department, Turkey
Martin Schläffer, Graz University of Technology, Austria
Miguel Soriano, UPC, Spain
Cosimo Stallo, University of Rome Tor Vergata, Italy
Neeraj Suri, Technische Universität Darmstadt, Germany
Willy Susilo, University of Wollongong, Australia
Chiu Tan, Temple University, United States
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Wen-guey Tzeng, National Chiao Tung University, Taiwan
Guilin Wang, University of Wollongong, Australia
Xinyuan (Frank) Wang, George Mason University , United States
Haining  Wang, The College of William and Mary, United States
Lingyu Wang, Concordia University Canada
Osman Yagan, Carnegie Mellon University, United States
Danfeng Yao, Virginia Tech, United States
Alec Yasinsac, University of South Alabama, United States
Shucheng Yu, University of Arkansas at Little Rock, United States
Wensheng Zhang, Iowa State University, United States
Futai Zhang, Nanjing Normal University, China
Wen Tao Zhu, Graduate University of Chinese Academy of Sciences, China

This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs:
secrypt2012@unimi.it

———————————————–

SECRYPT 2012 is part of the International Joint Conference on e-Business and 
Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int'l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int'l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int'l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int'l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int'l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

The conference program features a number of Keynote Lectures to be delivered by 
distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
– Sushil Jajodia, George Mason University Fairfax, United States
– Andreas Holzinger, Medical University Graz, Austria
(list not yet complete)
http://www.icete.org/KeynoteSpeakers.aspx

Nov 30

International Conference on Security and Cryptography – SECRYPT 2012

CALL FOR PAPERS

International Conference on Security and Cryptography – SECRYPT 2012

Website: http://www.secrypt.icete.org/
July 24 – 27, 2012
Rome, Italy

In cooperation with IEICE (The Institute of Electronics, Information and Communication Engineers)
and SWIM (Special Interest Group on Software Interprise Modeling)

Sponsored by INSTICC
INSTICC is member of WfMC (Workflow Management Coalition)


Important Deadlines: 
Regular Paper submission: March 5, 2012
Authors Notification (regular papers): April 24, 2012
Final Regular Paper Submission and Registration: May 7, 2012

###############################################################


Dear ,

We would like to draw your attention to the International Conference on Security and Cryptography (SECRYPT-2012), which has currently an open call for papers. 

Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.

SECRYPT 2012 is part of the International Joint Conference on e-Business and Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:

– DCNET: Int'l Conference on Data Communication Networking (http://www.dcnet.icete.org)
– ICE-B: Int'l Conference on e-Business (http://www.ice-b.icete.org)
– OPTICS: Int'l Conference on Optical Communication Systems (http://www.optics.icete.org)
– SIGMAP: Int'l Conference on Signal Processing and Multimedia Applications (http://www.sigmap.icete.org)
– WINSYS: Int'l Conference on Wireless Information Networks and Systems (http://www.winsys.icete.org)

These six concurrent conferences are held in parallel and registration to one warrants delegates to attend all six.

ICETE is interested in promoting high quality research as it can be confirmed by last year acceptance rates, where from 409 submissions, 12% were accepted as full papers, 16% were presented as short papers and 13% as posters.

The conference program features a number of Keynote Lectures to be delivered by distinguished world-class researchers, namely:
– Venu Govindaraju, University at Buffalo, United States
(list not yet complete)
http://www.icete.org/KeynoteSpeakers.aspx

Submitted papers will be subject to a double-blind review process. All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support. DEZO
A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book. 
Additionally, a short list of papers presented at the conference, will also be selected for publication in the Journal of Information Processing Systems (JIPS).
Furthermore, a short list of papers presented at the conference, will be selected for publication in a special issue of JNW – Journal of Networks

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and Elsevier Index (EI).
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). SciTePress is member of CrossRef (http://www.crossref.org/).

Workshops, Special sessions, Tutorials as well as Demonstrations dedicated to other technical/scientific topics are also envisaged: companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Workshop chairs and Special Session chairs will benefit from logistics support and other types of support, including secretariat and financial support, to facilitate the development of a valid idea.


CONFERENCE TOPICS
   * Access Control
   * Applied Cryptography
   * Biometrics Security and Privacy
   * Critical Infrastructure Protection
   * Data Integrity
   * Data Protection
   * Database Security and Privacy
   * Digital Forensics
   * Digital Rights Management
   * Ethical and Legal Implications of Security and Privacy
   * Human Factors and Human Behaviour Recognition Techniques
   * Identification, Authentication and Non-repudiation
   * Identity Management
   * Information Hiding
   * Information Systems Auditing
   * Insider Threats and Countermeasures
   * Intellectual Property Protection
   * Intrusion Detection & Prevention
   * Management of Computing Security
   * Network Security
   * Organizational Security Policies
   * Peer-to-Peer Security
   * Personal Data Protection for Information Systems
   * Privacy
   * Reliability and Dependability
   * Risk Assessment
   * Secure Cloud Computing
   * Secure Software Development Methodologies
   * Security and Privacy in Mobile Systems
   * Security and privacy in Complex Systems
   * Security and Privacy in IT Outsourcing
   * Security and Privacy in Location-based Services
   * Security and Privacy in Pervasive/Ubiquitous Computing
   * Security and Privacy in Social Networks
   * Security and Privacy in Web Services
   * Security and Privacy Policies
   * Security Area Control
   * Security Deployment
   * Security Engineering
   * Security for Grid Computing
   * Security in Distributed Systems
   * Security Information Systems Architecture and Design and Security Patterns
   * Security Management
   * Security Metrics and Measurement
   * Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
   * Security Verification and Validation
   * Sensor and Mobile Ad Hoc Network Security
   * Service and Systems Design and QoS Network Security
   * Software Security
   * Trust management and Reputation Systems
   * Ubiquitous Computing Security
   * Wireless Network Security (WiFi, WiMAX, WiMedia and others)


CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita degli Studi di Milano, Italy

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore 


Please check further details at the conference web site (http://www.secrypt.icete.org). 

Should you have any question or suggestion please don't hesitate to contact me.


Kind regards,
Monica Saramago
SECRYPT Secretariat

Av. D. Manuel I, 27A 2.esq.
2910-595 Setubal, Portugal
Tel.: +351 265 520 185
Fax: +44 203 014 5432
Email: secrypt.secretariat@insticc.org
Web: http://www.secrypt.icete.org