secrypt 2011: 6th International Conference on Security and Cryptography 2011

July 18, 2011-July 21, 2011 in Seville, Spain

Call for Papers

Deadline extension to February 18, 2011

[Apologies if you receive multiple copies of this message]

CALL FOR PAPERS


6th International Conference on Security and Cryptography (SECRYPT 2011) Seville, Spain, July 18-21, 2011 http://secrypt.icete.org ************************************************************************

SECRYPT is an annual international conference covering research in information and communication security. The 6th International Conference on Security and Cryptography (SECRYPT 2011) will be held in Seville, Spain. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. The conference topics include, but are not limited to:

  • Access Control
  • Applied Cryptography
  • Biometrics Security and Privacy
  • Critical Infrastructure Protection
  • Data Integrity
  • Data Protection
  • Database Security and Privacy
  • Digital Forensics
  • Digital Rights Management
  • Ethical and Legal Implications of Security and Privacy
  • Human Factors and Human Behaviour Recognition Techniques
  • Identification, Authentication and Non-repudiation
  • Identity Management
  • Information Hiding
  • Information Systems Auditing
  • Insider Threats and Countermeasures
  • Intellectual Property Protection
  • Intrusion Detection & Prevention
  • Management of Computing Security
  • Network Security
  • Organizational Security Policies
  • Peer-to-Peer Security
  • Personal Data Protection for Information Systems
  • Privacy
  • Reliability and Dependability
  • Risk Assessment
  • Secure Cloud Computing
  • Secure Software Development Methodologies
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Complex Systems
  • Security and Privacy in IT Outsourcing
  • Security and Privacy in Location-based Services
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Social Networks
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Metrics and Measurement
  • Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
  • Security Verification and Validation
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Trust Management and Reputation Systems
  • Ubiquitous Computing Security
  • Wireless Network Security (WiFi, WiMAX, WiMedia and others)

PAPER SUBMISSIONS Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions are to be made to the submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted:

  • Full Paper: A regular paper presents a work where the research is completed or almost finished. Authors of regular submitted papers will indicate at the time of submission whether they would like their paper to also be considered for publication as a position paper.
  • Position Paper: A position paper presents results that are preliminary or that simply require few pages to describe. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics. The acceptance of a position paper is restricted to the categories of “short paper” or “poster”.

Submitted papers must be formatted according to the SECRYPT format (apart for blinding authors), which is described at http://secrypt.icete.org/paper_formats.asp. Submission page limit is 10 pages for regular paper and 6 pages for position papers. Accepted papers will be subject to the limit of: 10 pages (for full papers), 6 pages (for short papers), and 4 pages (for posters). Submitted papers will be subject to a double-blind review process. All submissions should be anonymized. All accepted papers/posters will be published in the conference proceedings. A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book. Authors of accepted papers/posters must guarantee that their papers will be presented at the conference.

IMPORTANT DATES Full Paper submission: February 18, 2011 (midnight Samoa time) FIRM DEADLINE Authors Notification (full papers): April 16, 2011 Final Full Paper Submission and Registration: May 5, 2011

CONFERENCE CO-CHAIRS Mohammad S. Obaidat, Monmouth University, U.S.A. Jose Sevillano, University of Seville, Spain

PROGRAM CO-CHAIRS Pierangela Samarati, Universita’ degli Studi di Milano, Italy Javier Lopez, University of Malaga, Spain

PROGRAM COMMITTEE Claudio Ardagna, Universita’ degli Studi di Milano, Italy Ken Barker, University of Calgary, Canada Giampaolo Bella, Universita’ di Catania, Italy Marina Blanton, University of Notre Dame, United States Carlo Blundo, Universita’ degli Studi di Salerno, Italy Gil Pino Caballero, Universidad De La Laguna, Spain David Chadwick, University of Kent, United Kingdom Jorge Cuellar, Siemens AG, Germany Frederic Cuppens, Ecole Nationale De Telecommunications De Bretagne, France Paolo D’Arco, Universita’ degli Studi di Salerno, Italy Jorge Davila, UPM, Spain Sabrina De Capitani di Vimercati, Universita’ degli Studi di Milano, Italy Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain Eduardo B. Fernandez, Florida Atlantic University, United States Eduardo Fernandez-Medina, University of Castilla-La Mancha, Spain Alberto Ferrante, University of Lugano, Switzerland Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain Simone Fischer-Hubner, Karlstad University, Sweden Sara Foresti, Universita’ degli Studi di Milano, Italy Keith Frikken, Miami University of Ohio, United States Steven Furnell, University of Plymouth, United Kingdom Amparo Fuster-Sabater, C.S.I.C., Spain Rafael M. Gasca, University of Seville, Spain Antonio Gomez-Skarmeta, University of Murcia, Spain Dimitris Gritzalis, AUEB, Greece Yong Guan, Iowa State University, United States Ragib Hasan, Johns Hopkins University, United States Jordi Herrera, UAB, Spain Jiankun Hu, RMIT University, Australia Michael Huth, Imperial College London, United Kingdom Cynthia Irvine, Naval Postgraduate School, United States Audun Josang, QUT, Australia Sokratis Katsikas, University of Piraeus, Greece Stefan Katzenbeisser, Technische Universitat Darmstadt, Germany Costas Lambrinoudakis, University of Piraeus, Greece Bo Lang, Beijing University of Aeronautics and Astronautics, China Olivier Markowitch, Universite Libre de Bruxelles, Belgium Vashek Matyas, Masaryk University, Czech Republic Carlos Maziero, Pontifical Catholic University, Brazil Jorge Guajardo Merchan, Philips Research Eindhoven, Netherlands Chris Mitchell, Royal Holloway, University of London, United Kingdom Marco Casassa Mont, Hewlett-Packard Laboratories, United Kingdom Juan Gonzalez Nieto, Queensland University of Technology, Australia Eiji Okamoto, University of Tsukuba, Japan Rolf Oppliger, Esecurity Technologies, Switzerland Stefano Paraboschi, University of Bergamo, Italy Gerardo Pelosi, Politecnico di Milano, Italy Gunther Pernul, University of Regensburg, Germany Alessandro Piva, Universita’ degli Studi di Firenze, Italy Joachim Posegga, Inst. of IT Security and Security Law, Germany Kui Ren, Illinois Institute of Technology, United States Carlos Ribeiro, IST, Portugal Neeraj Suri, Technische Universitat Darmstadt, Germany Willy Susilo, University of Wollongong, Australia Juan Tapiador, University of York, United Kingdom Marianthi Theoharidou, AUEB, Greece Lingyu Wang, Concordia University, Canada Yang Xiang, Central Queensland University, Australia Alec Yasinsac, University of South Alabama, United States Nicola Zannone, Eindhoven University of Technology, The Netherlands Justin Zhang, North Carolina A&T State University, USA Jianying Zhou, Institute For Infocomm Research, Singapore Bo Zhu, Concordia Univerity, Canada

This call for papers and additional information about the conference can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs: secrypt2011@unimi.it