International Conference on Security and Cryptography
SECRYPT 2010 – International Conference on Security and Cryptography: July 26-28, Athens, Greece
July 26-28     Athens, Greece
Call for Papers


The purpose of SECRYPT 2010, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication. Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.
Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics that can be listed, as indicated below.

Ideas on how to analyze and approach security problems by combining information and communication technologies with the appropriate theoretical work including information theory and communication theory, either in the scope of R&D projects, engineering or business applications, are welcome. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of SECRYPT, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and poster sessions.
The best papers will be selected to appear in a book to be published by Springer-Verlag.

Special sessions, case studies and tutorials dedicated to technical/scientific topics related to the main conference are also envisaged: researchers interested in organizing a special session, or companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat.

Conference Areas

Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:

  • › Data and Application Security and Privacy
  • › Access Control and Intrusion Detection
  • › Network Security and Protocols
  • › Cryptographic Techniques and Key Management
  • › Information Assurance
  • › Security in Information Systems and Software Engineering
Area 1: Data and Application Security and Privacy
  • › Data protection
  • › Database security
  • › Identity management
  • › Privacy
  • › Secure cloud computing
  • › Security and privacy in IT outsourcing
  • › Security and privacy in location-based services
  • › Security and privacy in pervasive/ubiquitous computing
  • › Security and privacy in social networks
  • › Security and privacy policies
  • › Security management
  • › Trust and reputation systems
  • › Trust management
Area 2: Access Control and Intrusion Detection
  • › Intrusion Detection and Vulnerability Assessment
  • › Identification, Authentication and Non-repudiation
  • › Insider Threats and Countermeasures
  • › Intrusion Detection & Prevention
  • › Biometric Security
  • › Regulation and Trust Mechanisms
  • › Data Integrity
  • › Models for Authentication, Trust and Authorization
  • › Access Control in Computing Environments
  • › Data Access & Synchronization
  • › Security in Distributed Systems
Area 3: Network Security and Protocols
  • › IPsec, VPNs and Encryption Modes
  • › Service and Systems Design and QoS Network Security
  • › Reliability and Dependability
  • › Web Performance and Reliability
  • › Denial of Service and Other Attacks
  • › Data and Systems Security
  • › Mobile System Security
  • › Ubiquitous Computing Security
  • › Sensor and Mobile Ad Hoc Network Security
  • › Wireless Network Security (WiFi, WiMAX, WiMedia and Others)
  • › Peer-to-Peer Security
  • › Phishing, adfraud, malware, and countermeasures
  • › Active Defense Systems
Area 4: Cryptographic Techniques and Key Management
  • › Smart Card Security
  • › Public Key Crypto Applications
  • › Coding Theory and Practice
  • › Speech/Image Coding
  • › Shannon Theory
  • › Mobile Code & Agent Security
  • › Digital Rights Management
  • › Digital Forensics
Area 5: Information Assurance
  • › Planning Security
  • › Risk Assessment
  • › Security Area Control
  • › Organizational Security Policies and Responsability
  • › Security Through Collaboration
  • › Human Factors and Human Behaviour Recognition Techniques
  • › Ethical and Legal Implications
  • › Information Hiding
  • › Information Systems Auditing
  • › Management of Computing Security
  • › Intellectual Property Protection
Area 6: Security in Information Systems and Software Engineering
  • › Secure Software Development Methodologies
  • › Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • › Security Information Systems Architecture and Design and Security Patterns
  • › Security Implementation
  • › Security Verification and Validation
  • › Security Deployment
  • › Security for Grid Computing and Web Services
  • › Security Engineering
  • › Security Metrics and Measurement
  • › Personal Data Protection for Information Systems
Keynote Speakers

Stamatios Kartalopoulos, University of Oklahoma, U.S.A.


All accepted papers will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.
A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book.
The proceedings will be indexed by Conference Proceedings Citation Index, INSPEC and DBLP.
EI already agreed to index the proceedings of SECRYPT 2006, 2007 and 2008. Proceedings of SECRYPT 2009 are under evaluation and the proceedings of SECRYPT 2010 will be considered by EI after their publication.


Greece, located in the southeastern Europe, is a very beautiful country that offers top quality tourist attractions to the visitor. Consisting of the main land and several islands, it offers beautiful beaches, lovely mountain landscapes, many picturesque villages, and a wealth of archaeological sites and treasures.
Piraeus, Greece's third largest urban centre and now part of the Athens metropolitan area, is located a few minutes away from the center of Athens - Greece's capital named after Athena, the goddess of wisdom, is a very attractive and busy city.
Piraeus has the biggest harbour in all Greece and one of the most important in the mediterranean. At the top of that harbour, many little picturesque and lively bays may be found having many excellent cafeterias and traditional Greek restaurants and taverns.
Piraeus is an ideal place to start off excursions both for island cruising and mainland sightseeing. There are many boats that start off their journey to the numerous beautiful Greek islands from the harbour of Piraeus which is the main connection point to all of the Greek islands.
The conference will be held at the University of Piraeus, which was founded in 1938 under the title of the “School for Industrial Studies” and located in a modern building in the centre of Piraeus (one of the 8 universities in the region of Athens), in collaboration with the department of informatics. The department began operating in 1992 and focuses on both theoretical and practical aspects and advancements of computer science.

Program Co-chairs

Pierangela Samarati, Università degli Studi di Milano, Italy
Sokratis Katsikas, University of Piraeus, Greece

Program Committee

Xinyuan (Frank) Wang, George Mason University, United States
Anas Abou El Kalam, École Nationale Supérieure d'Ingénieur de Bourges, France
Claudio Ardagna, Universita` degli Studi di Milano, Italy
Helen Ashman, University of South Australia, Australia
Vijay Atluri, Rutgers University, United States
Ken Barker, University of Calgary, Canada
Mauro Barni, Universita` di Siena, Italy
Giampaolo Bella, Università Di Catania & De Montfort University, Italy
Marina Blanton, University of Notre Dame, United States
Carlo Blundo, Università di Salerno, Italy
Mike Burmester, Florida State University, United States
Marco Casassa Mont, Hewlett-Packard Laboratories, United Kingdom
David Chadwick, University of Kent, United Kingdom
Paolo D'arco, University of Salerno, Italy
Anupam Datta, Carnegie Mellon University, United States
Bart De Decker, K. U. Leuven, Belgium
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Sara Foresti, Universita' degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Dieter Gollmann, Tu Hamburg-harburg, Germany
Stefanos Gritzalis, University of the Aegean, Greece
Jorge Guajardo Merchan, Philips Research Eindhoven, Netherlands
Yong Guan, Iowa State University, United States
Ragib Hasan, Johns Hopkins University, United States
Jiankun Hu, RMIT University, Australia
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Willem Jonker, Philips Research Nederland, Netherlands
Maria Karyda, University of the Aegean, Greece
Stefan Katzenbeisser Katzenbeisser, Technische Universität Darmstadt, Germany
Costas Lambrinoudakis, University of Piraeus, Greece
Costas Lambrinoudakis, University of the Aegean, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China
Gyungho Lee, Korea University, Korea, Republic of
Albert Levi, Sabanci University, Turkey
Javier Lopez, University of Malaga, Spain
Wenjing Lou, Worcester Polytechnic Institure, United States
Manu Malek, Stevens Institute of Technology, United States
Masahiro Mambo, Universit of Tsukuba, Japan
Antonio Maña, University of Malaga, Spain
Konstantinos Markantonakis, Royal Holloway, University of London, United Kingdom
Evangelos Markatos, ICS, Forth, Greece
Fabio Martinelli, IIT-CNR, Italy
Sjouke Mauw, University of Luxembourg, Luxembourg
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Refik Molva, Eurecom, France
Pekka Nikander, Ericsson Research NomadicLab, Finland
Jose A. Onieva, University of Malaga, Spain
Rolf Oppliger, Esecurity Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Universita` degli Studi di Bergamo, Italy
Günther Pernul, University of Regensburg, Germany
Milan Petkovic, Philips Research Labs, Netherlands
Alessandro Piva, Universita`degli Studi di Firenze, Italy
Joachim Posegga, Inst. of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Carlos Ribeiro, IST, Portugal
Panos Rizomiliotis, University of the Aegean, Greece
Rodrigo Roman, University of Malaga, Spain
Damien Sauveron, Xlim -- University of Limoges, France
Shamik Sural, Indian Institute of Technology, India
Willy Susilo, University of Wollongong, Australia
Angeliki Tsochou, University of the Aegean, Greece
Sabrina de Capitani di Vimercati, Università degli Studi di Milano, Italy
Lingyu Wang, Concordia University, Canada
Yang Xiang, Central Queensland University, Australia
Alec Yasinsac, University of South Alabama, United States
Justin Zhan, Carnegie Mellon University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore