CALL FOR PAPERS
10th International Conference on Security and Cryptography - SECRYPT 2013
Website: http://www.secrypt.icete.org
July 29 - 31, 2013
Reykjavík, Iceland
Important Deadlines:
Regular Papers
Paper Submission: February 22, 2013
Authors Notification: May 6, 2013
Final Paper Submission and Registration: May 20, 2013
Sponsored by:
INSTICC - Institute for Systems and Technologies of Information, Control and Communication
Co-organized by:
Reykjavik University
INSTICC is Member of:
WFMC- Workflow Management
The purpose of SECRYPT 2013, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication. Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.
Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics that can be listed, as indicated below.
Ideas on how to analyze and approach security problems by combining information and communication technologies with the appropriate theoretical work including information theory and communication theory, either in the scope of R&D projects, engineering or business applications, are welcome. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of SECRYPT, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and poster sessions.
The best papers will be selected to appear in a book to be published by Springer-Verlag.
Special sessions, case studies and tutorials dedicated to technical/scientific topics related to the main conference are also envisaged: researchers interested in organizing a special session, or companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat.
KEYNOTE SPEAKERS
ICETE 2013 will have several invited keynote speakers, who are internationally recognized experts in their areas. Their names are not yet confirmed.
PUBLICATIONS
All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/).
SciTePress is member of CrossRef (http://www.crossref.org/).
A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book
The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier Index).
AWARDS
Best paper awards will be distributed during the conference closing session.
Please check the website for further information (http://www.secrypt.icete.org/BestPaperAward.aspx).
ICETE Conference Chair
Mohammad S. Obaidat, Monmouth University, United States
Program Chair
Pierangela Samarati, Universita' degli Studi di Milano, Italy
Conference Topics
Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security
PROGRAM COMMITTEE
http://www.secrypt.icete.org/ProgramCommittee.aspx
Please check further details at the conference website (http://www.secrypt.icete.org).