Print

Print


CALL FOR PAPERS

 

10th International Conference on Security and Cryptography - SECRYPT 2013

 

Website: http://www.secrypt.icete.org

 

July  29 - 31, 2013

Reykjavík, Iceland

Important Deadlines: 

 

Regular Papers

 

Paper Submission: February 22, 2013

Authors Notification: May 6, 2013

Final Paper Submission and Registration: May 20, 2013 

 

 

Sponsored by:

 

INSTICC - Institute for Systems and Technologies of Information, Control and
Communication 

 

 

Co-organized by:

 

Reykjavik University

 

 

INSTICC is Member of:

 

WFMC- Workflow Management

 

 

The purpose of SECRYPT 2013, the International Conference on Security and
Cryptography, is to bring together researchers, mathematicians, engineers
and practitioners interested on security aspects related to information and
communication. Theoretical and practical advances in the fields of
cryptography and coding are a key factor in the growth of data
communications, data networks and distributed computing. In addition to the
mathematical theory and practice of cryptography and coding, SECRYPT also
focuses on other aspects of information systems and network security,
including applications in the scope of the knowledge society in general and
information systems development in particular, especially in the context of
e-business, internet and global enterprises.

Information theory and information security are hot topics nowadays, ranging
from statistics and stochastic processes to coding, from detection and
estimation to Shannon theory, from data compression to data networks and
systems security, cryptography, as well as many other topics that can be
listed, as indicated below.

 

Ideas on how to analyze and approach security problems by combining
information and communication technologies with the appropriate theoretical
work including information theory and communication theory, either in the
scope of R&D projects, engineering or business applications, are welcome.
Papers describing new methods or technologies, advanced prototypes, systems,
tools and techniques and general survey papers indicating future directions
are also encouraged. Papers describing original work are invited in any of
the areas listed below. Accepted papers, presented at the conference by one
of the authors, will be published in the Proceedings of SECRYPT, with an
ISBN. Acceptance will be based on quality, relevance and originality. Both
full research reports and work-in-progress reports are welcome. There will
be both oral and poster sessions.

The best papers will be selected to appear in a book to be published by
Springer-Verlag.

 

Special sessions, case studies and tutorials dedicated to
technical/scientific topics related to the main conference are also
envisaged: researchers interested in organizing a special session, or
companies interested in presenting their products/methodologies or
researchers interested in holding a tutorial are invited to contact the
conference secretariat.

 

 

KEYNOTE SPEAKERS

 

ICETE 2013 will have several invited keynote speakers, who are
internationally recognized experts in their areas. Their names are not yet
confirmed.

 

PUBLICATIONS

 

All accepted papers (full, short and posters) will be published in the
conference proceedings, under an ISBN reference, on paper and on CD-ROM
support.

All papers presented at the conference venue will be available at the
SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/).

SciTePress is member of CrossRef (http://www.crossref.org/).

A short list of presented papers will be selected so that revised and
extended versions of these papers will be published by Springer-Verlag in a
CCIS Series book

The proceedings will be submitted for indexation by Thomson Reuters
Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier
Index). 

 

AWARDS

 

Best paper awards will be distributed during the conference closing session.


Please check the website for further information
(http://www.secrypt.icete.org/BestPaperAward.aspx).

 

ICETE Conference Chair

 

Mohammad S. Obaidat, Monmouth University, United States 

 

Program Chair

Pierangela Samarati, Universita' degli Studi di Milano, Italy

 

Conference Topics

 

    

    Access Control

    Applied Cryptography

    Biometrics Security and Privacy

    Critical Infrastructure Protection

    Data Integrity

    Data Protection

    Database Security and Privacy

    Digital Forensics

    Digital Rights Management

    Ethical and Legal Implications of Security and Privacy

    Formal Methods for Security

    Human Factors and Human Behavior Recognition Techniques

    Identification, Authentication and Non-repudiation

    Identity Management

    Information Hiding

    Information Systems Auditing

    Insider Threats and Countermeasures

    Intellectual Property Protection

    Intrusion Detection & Prevention

    Management of Computing Security

    Network Security

    Organizational Security Policies

    Peer-to-Peer Security

    Personal Data Protection for Information Systems

    Privacy

    Privacy Enhancing Technologies

    Reliability and Dependability

    Risk Assessment

    Secure Software Development Methodologies

    Security and privacy in Complex Systems

    Security and Privacy in Crowdsourcing

    Security and Privacy in IT Outsourcing

    Security and Privacy in Location-based Services

    Security and Privacy in Mobile Systems

    Security and Privacy in Pervasive/Ubiquitous Computing

    Security and Privacy in Smart Grids

    Security and Privacy in Social Networks

    Security and Privacy in the Cloud

    Security and Privacy in Web Services

    Security and Privacy Policies

    Security Area Control

    Security Deployment

    Security Engineering

    Security in Distributed Systems

    Security Information Systems Architecture

    Security Management

    Security Metrics and Measurement

    Security Protocols

   Security requirements

    Security Verification and Validation

    Sensor and Mobile Ad Hoc Network Security

    Service and Systems Design and QoS Network Security

    Software Security

    Trust management and Reputation Systems

    Ubiquitous Computing Security

    Wireless Network Security

 

 

PROGRAM COMMITTEE

 

http://www.secrypt.icete.org/ProgramCommittee.aspx

 

 

Please check further details at the conference website
(http://www.secrypt.icete.org).