9th International Conference on Security and Cryptography (SECRYPT 2012)
Rome, Italy, July 24-27, 2012
http://secrypt.icete.org
SECRYPT is an annual international conference covering research in information and communication security. The 9th International Conference on Security and Cryptography (SECRYPT 2012) will be held in Rome, Italy. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. The conference topics include, but are not limited to:
- Access Control
- Applied Cryptography
- Authentication
- Biometrics Security and Privacy
- Critical Infrastructure Protection
- Data Integrity
- Data Protection
- Database Security and Privacy
- Digital Forensics
- Digital Rights Management
- Ethical and Legal Implications of Security and Privacy
- Formal Methods for Security
- Human Factors and Human Behaviour Recognition Techniques
- Identification, Authentication and Non-repudiation
- Identity Management
- Information Hiding
- Information Systems Auditing
- Insider Threats and Countermeasures
- Intellectual Property Protection
- Intrusion Detection & Prevention
- Management of Computing Security
- Network Security
- Organizational Security Policies
- Peer-to-Peer Security
- Personal Data Protection for Information Systems
- Privacy
- Privacy Enhancing Technologies
- Reliability and Dependability
- Risk Assessment
- Secure Cloud Computing
- Secure Software Development Methodologies
- Security Protocols
- Security and Privacy in Mobile Systems
- Security and Privacy in Complex Systems
- Security and Privacy in IT Outsourcing
- Security and Privacy in Location-based Services
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in Social Networks
- Security and Privacy in Web Services
- Security and Privacy Policies
- Security Area Control
- Security Deployment
- Security Engineering
- Security for Grid Computing
- Security in Distributed Systems
- Security Information Systems Architecture and Design and Security Patterns
- Security Management
- Security Metrics and Measurement
- Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
- Security Verification and Validation
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and QoS Network Security
- Software Security
- Trust Management and Reputation Systems
- Ubiquitous Computing Security
- Wireless Network Security (WiFi, WiMAX, WiMedia and others)
PAPER SUBMISSIONS Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Submissions are to be made to the submission web site at http://www.insticc.org/Primoris.
Two categories of papers can be submitted:
- Full Paper: A full paper presents a work where the research is completed or almost finished. Authors of regular submitted papers will indicate at the time of submission whether they would like their paper to also be considered for publication as a position paper.
- Position Paper: A position paper presents results that are preliminary or that simply require few pages to describe. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures, or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics. The acceptance of a position paper is restricted to the categories of “short paper” or “poster”.
Submitted papers must be formatted according to the SECRYPT format (with the exception that authors should be blinded in the submission), which is described at http://secrypt.icete.org/paper_formats.asp. Submission page limit is 10 pages for full paper and 6 pages for position papers. Accepted papers will be subject to the limit of: 10 pages (for full papers), 6 pages (for short papers), and 4 pages (for posters). Submitted papers will be subject to a double-blind review process. All submissions should be anonymized. All accepted papers/posters will be published in the conference proceedings. A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book. Authors of accepted papers/posters must guarantee that their papers/posters will be presented at the conference.
IMPORTANT DATES
- Full Paper submission: March 19, 2012
- Authors Notification (full papers): May 4, 2012
- Final Full Paper Submission and Registration: May 14, 2012
CONFERENCE CHAIR
- Mohammad S. Obaidat, Monmouth University, U.S.A.
PROGRAM CHAIR
- Pierangela Samarati, Universita’ degli Studi di Milano, Italy
PROGRAM CO-CHAIRS
- Wenjing Lou, Virginia Polytechnic Institute and State University, United States
- Jianying Zhou, Institute For Infocomm Research, Singapore
PROGRAM COMMITTEE
- Claudio Ardagna, Universita` degli Studi di Milano, Italy
- Ken Barker, University of Calgary, Canada
- Carlo Blundo, Università di Salerno,, Italy
- David Chadwick, University of Kent ,United Kingdom
- Aldar Chan, Institute for Infocomm Researc,h Singapore
- Ee-chien Chang, National University of Singapore Singapore
- Yingying Chen, Stevens Institute of Technology,, United States
- Cheng-Kang Chu, Institute for Infocomm Research, Singapore
- Marco Cova, University of Birmingham,, United Kingdom
- Jorge Cuellar, Siemens AG,, Germany
- Frédéric Cuppens, Ecole Nationale de Télécommunications de Bretagne,, France
- Reza Curtmola, New Jersey Institute of Tech,, United States
- Ricardo Dahab, University of Campinas (UNICAMP) ,, Brazil
- Sabrina De Capitani di Vimercati, Università degli Studi di Milano, Italy
- Roberto Di Pietro, Universita’ di Roma Tre,, Italy
- Tassos Dimitriou, Athens Information Technology,, Greece
- Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
- Eduardo B. Fernandez, Florida Atlantic University, United States
- Eduardo Fernández-medina, University of Castilla-La Mancha, Spain
- Alberto Ferrante, University of Lugano, Switzerland
- Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
- Simone Fischer-Hübner, Karlstad University, Sweden
- Sara Foresti, Universita’ degli Studi di Milano, Italy
- Keith Frikken, Miami University of Ohio, United States
- Steven Furnell, University of Plymouth, United Kingdom
- Mark Gondree, Naval Postgraduate School, United States
- Dimitris Gritzalis, AUEB, Greece
- Yong Guan, Iowa State University, United States
- Xinyi Huang, Fujian Normal University, China
- Michael Huth, Imperial College London, United Kingdom
- Cynthia Irvine, Naval Postgraduate School, United States
- Sokratis Katsikas, University of Piraeus, Greece
- Stefan Katzenbeisser, Technische Universität Darmstadt, Germany
- Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
- Costas Lambrinoudakis, University of Piraeus, Greece
- Bo Lang Beijing, University of Aeronautics and Astronautics, China
- Loukas Lazos, University of Arizona, United States
- Adam J. Lee, University of Pittsburgh, United States
- Patrick Lee, Chinese University of Hong Kong Hong Kong
- Albert Levi, Sabanci University, Turkey
- Jiguo Li, Hohai University, China
- Ming Li, Utah State University, United States
- Giovanni Livraga, Universita degli Studi di Milano, Italy
- Javier Lopez, University of Malaga, Spain
- Emil Lupu, Imperial College, United Kingdom
- Luigi Mancini, University of Rome La Sapienza, Italy
- Olivier Markowitch, Université Libre de Bruxelles, Belgium
- Vashek Matyas, Masaryk University Czech Republic
- Carlos Maziero, UTFPR - Federal University of Technology - Paraná state, Brazil
- Chris Mitchell, Royal Holloway, University of London, United Kingdom
- Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
- Marco Casassa-Mont, Hewlett-Packard Laboratories, United Kingdom
- David Naccache, Ecole Normale Superieure, France
- Guevara Noubir, Northeastern University, United States
- Eiji Okamoto, University of Tsukuba, Japan
- Rolf Oppliger, eSECURITY Technologies, Switzerland
- Stefano Paraboschi, University of Bergamo, Italy
- Gerardo Pelosi, Politecnico di Milano, Italy
- Günther Pernul, University of Regensburg, Germany
- Raphael C.-w. Phan, Loughborough University, United Kingdom
- Radha Poovendran, University of Washington, United States
- Joachim Posegga, Institute of IT Security and Security Law, Germany
- Kui Ren, Illinois Institute of Technology, United States
- Jian Ren, Michigan State University, United States
- Sushmita Ruj, University of Ottawa Canada
- Gokay Saldamli Bogazici, University MIS department, Turkey
- Martin Schläffer, Graz University of Technology, Austria
- Miguel Soriano, UPC, Spain
- Cosimo Stallo, University of Rome Tor Vergata, Italy
- Neeraj Suri, Technische Universität Darmstadt, Germany
- Willy Susilo, University of Wollongong, Australia
- Chiu Tan, Temple University, United States
- Juan Tapiador, Universidad Carlos III de Madrid, Spain
- Wen-guey Tzeng, National Chiao Tung University, Taiwan
- Guilin Wang, University of Wollongong, Australia
- Xinyuan (Frank) Wang, George Mason University , United States
- Haining Wang, The College of William and Mary, United States
- Lingyu Wang, Concordia University Canada
- Osman Yagan, Carnegie Mellon University, United States
- Danfeng Yao, Virginia Tech, United States
- Alec Yasinsac, University of South Alabama, United States
- Shucheng Yu, University of Arkansas at Little Rock, United States
- Wensheng Zhang, Iowa State University, United States
- Futai Zhang, Nanjing Normal University, China
- Wen Tao Zhu, Graduate University of Chinese Academy of Sciences, China
This call for papers and additional information about the conference can be found at http://secrypt.icete.org/
For any questions, please contact the program chairs: secrypt2012@unimi.it
SECRYPT 2012 is part of the International Joint Conference on e-Business and Telecommunications (ICETE 2012) that has 5 more conferences with very strong synergies between them, namely:
The conference program features a number of Keynote Lectures to be delivered by distinguished world-class researchers, namely:
- Venu Govindaraju, University at Buffalo, United States
- Sushil Jajodia, George Mason University Fairfax, United States
- Andreas Holzinger, Medical University Graz, Austria
- Geoffrey Charles Fox, Indiana University, United States
http://www.icete.org/KeynoteSpeakers.aspx