PRIMORIS      Contacts      FAQs      INSTICC Portal
 

Call for Papers

SECRYPT is sponsored by INSTICC – Institute for Systems and Technologies of Information, Control and Communication

SCOPE

SECRYPT is an annual international conference covering research in information and communication security. The 11th International Conference on Security and Cryptography (SECRYPT 2014) will be held in Vienna, Austria on 28-30 August 2014.

The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography.
Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of SECRYPT, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and poster sessions. The best papers will be selected to appear in a book to be published by Springer-Verlag.

Special sessions, case studies and tutorials dedicated to technical/scientific topics related to the main conference are also envisaged: researchers interested in organizing a special session, or companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat.

CONFERENCE TOPICS


  • Access Control
  • Applied Cryptography
  • Biometrics Security and Privacy
  • Critical Infrastructure Protection
  • Data Integrity
  • Data Protection
  • Database Security and Privacy
  • Digital Forensics
  • Digital Rights Management
  • Ethical and Legal Implications of Security and Privacy
  • Formal Methods for Security
  • Human Factors and Human Behavior Recognition Techniques
  • Identification, Authentication and Non-repudiation
  • Identity Management
  • Information Hiding
  • Information Systems Auditing
  • Insider Threats and Countermeasures
  • Intellectual Property Protection
  • Intrusion Detection & Prevention
  • Management of Computing Security
  • Network Security
  • Organizational Security Policies
  • Peer-to-Peer Security
  • Personal Data Protection for Information Systems
  • Privacy
  • Privacy Enhancing Technologies
  • Reliability and Dependability
  • Risk Assessment
  • Secure Software Development Methodologies
  • Security and Privacy for Big Data
  • Security and privacy in Complex Systems
  • Security and Privacy in Crowdsourcing
  • Security and Privacy in IT Outsourcing
  • Security and Privacy in Location-based Services
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Smart Grids
  • Security and Privacy in Social Networks
  • Security and Privacy in the Cloud
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security in Distributed Systems
  • Security Information Systems Architecture
  • Security Management
  • Security Metrics and Measurement
  • Security Protocols
  • Security requirements
  • Security Verification and Validation
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Trust management and Reputation Systems
  • Ubiquitous Computing Security
  • Wireless Network Security

ICETE KEYNOTE SPEAKERS

Seymour GoodmanGeorgia Institute of Technology, United States
Ivona BrandićVienna UT, Austria
Dimitris KaragiannisUniversity of Vienna, Austria
Matteo GolfarelliUniversity of Bologna, Italy
Edgar WeipplSBA Research, Austria

PAPER SUBMISSION

Authors should submit a paper in English, carefully checked for correct grammar and spelling, addressing one or several of the conference areas or topics. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. To facilitate the double-blind paper evaluation method, authors are kindly requested to produce and provide the paper WITHOUT any reference to any of the authors, including the authors’ personal details, the acknowledgments section of the paper and any other reference that may disclose the authors’ identity.

Only original papers should be submitted. Authors are advised to read INSTICC's ethical norms regarding plagiarism and self-plagiarism thoroughly before submitting and must make sure that their submissions do not substantially overlap work which has been published elsewhere or simultaneously submitted to a journal or another conference with proceedings. Papers that contain any form of plagiarism will be rejected without reviews.

Authors can submit their work in the form of a Regular Paper, representing completed and validated research, or as a Position Paper. A position paper presents results that are preliminary or that simply require fewer pages to describe. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (theoretical or experimental) on one of the conference topics.

All papers must be submitted through the online submission platform PRIMORIS and should follow the instructions and templates that can be found under Guidelines and Templates. After the paper submission has been successfully completed, authors will receive an automatic confirmation e-mail.

Authors of registered papers (including posters) must guarantee that their papers will be presented at the conference. Papers which are not presented will be excluded from the SCITEPRESS digital library and will not be selected for any post publication.

PUBLICATIONS

All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
SCITEPRESS is a member of CrossRef (http://www.crossref.org/) and every paper on our digital library is given a DOI (Digital Object Identifier).
All papers presented at the conference venue will be available at the SCITEPRESS Digital Library.
A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer in a CCIS Series book.
The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (CPCI/ISI), INSPEC, DBLP, EI (Elsevier Engineering Village Index) and Scopus.

IMPORTANT DATES

Conference Date: 28 - 30 August, 2014

Paper Submission: April 30, 2014 (expired)
Authors Notification:
June 16, 2014 (expired)
Camera Ready and Registration:
June 30, 2014 (expired)

Paper Submission: June 4, 2014 (expired)
Authors Notification:
June 27, 2014 (expired)
Camera Ready and Registration:
July 7, 2014 (expired)

Workshops
Workshop Proposal: May 19, 2014 (expired)

Doctoral Consortium
Paper Submission: June 27, 2014 (expired)
Authors Notification: July 10, 2014 (expired)
Camera Ready and Registration: July 22, 2014 (expired)

Special Sessions
Special Session Proposal: May 19, 2014 (expired)

Tutorials
Tutorial Proposal: June 18, 2014 (expired)

Demos
Demo Proposal: June 18, 2014 (expired)

Panels
Panel Proposal: June 18, 2014 (expired)

SECRETARIAT

SECRYPT Secretariat
Address: Av. D. Manuel I, 27A, 2º esq.
             2910-595 Setubal - Portugal
Tel.: +351 265 520 185
Fax: +44 203 014 8813
e-mail: secrypt.secretariat@insticc.org
Web: http://www.secrypt.icete.org/

VENUE

The conference will take place at the Vienna University of Technology - Freihaus Building (in German Technische Universität Wien).
For nearly 200 years the Vienna University of Technology has been considered Austria’s largest scientific research and educational institution, as well as one of the most successful technical universities in Europe.

PROGRAM CHAIR

Pierangela SamaratiUniversità degli Studi di Milano, Italy

PROGRAM COMMITTEE MEMBERS

Ehab Al-Shaer, University of North Carolina Charlotte, United States
Alessandro Armando, FBK, Italy
Prithvi Bisht, Adobe, United States
Carlo Blundo, Università di Salerno, Italy
Andrey Bogdanov, Technical University of Denmark, Denmark
Frederic Cuppens, TELECOM Bretagne, France
Nora Cuppens-Boulahia, Institut Mines Telecom / Telecom Bretagne, France
Sabrina de Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre, Italy
Tassos Dimitriou, Computer Technology Institute, Greece and Kuwait University, Kuwait
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Alberto Ferrante, Università della Svizzera Italiana, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
William Fitzgerald, EMC, Ireland
Sara Foresti, Universita' degli Studi di Milano, Italy
Steven Furnell, University of Plymouth, United Kingdom
Joaquin Garcia-Alfaro, Institut Mines-Telecom, TELECOM SudParis, France
Mark Gondree, Sonoma State University, United States
Dimitris Gritzalis, AUEB, Greece
Stefanos Gritzalis, University of the Aegean, Greece
Yong Guan, Iowa State University, United States
Sokratis Katsikas, Norwegian University of Science and Technology, Norway
Shinsaku Kiyomoto, KDDI Research Inc., Japan
Ruggero Donida Labati, Università degli Studi di Milano, Italy
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China
Adam J. Lee, University of Pittsburgh, United States
Patrick P. C. Lee, Chinese University of Hong Kong, Hong Kong
Albert Levi, Sabanci University, Turkey
Ming Li, Utah State University, United States
Jiguo Li, Hohai University, China
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Haibing Lu, Santa Clara University, United States
Emil Lupu, Imperial College, United Kingdom
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero, UFPR - Federal University of Paraná, Brazil
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
David Naccache, Ecole Normale Superieure, France
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Joon Park, Syracuse University, United States
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany
Joachim Posegga, Institute of IT Security and Security Law, Germany
Silvio Ranise, Fondazione Bruno Kessler, Italy
Kui Ren, State University of New York at Buffalo, United States
Nicolas Sklavos, University of Patras, Greece
Alessandro Sorniotti, IBM Research - Zurich, Switzerland
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Vicenc Torra, University of Skövde, Sweden
Jaideep Vaidya, Rutgers Business School, United States
Luca Viganò, King's College London, United Kingdom
Haining Wang, The College of William and Mary, United States
Xinyuan (Frank) Wang, George Mason University, United States
Cong Wang, City University of Hong Kong, Hong Kong
Lingyu Wang, Concordia University, Canada
Ping Wang, Symantec Corporation, United States
Edgar Weippl, SBA Research, Austria
Alec Yasinsac, University of South Alabama, United States
Meng Yu, Virginia Commonwealth University, United States
Lei Zhang, Thomson Reuters, United States

(list not yet complete)
footer