[FM-India] [SECRYPT 2011] Submission Deadline Extended to February 18, 2011

Claudio Agostino Ardagna (claudio.ardagna) claudio.ardagna at unimi.it
Wed Feb 2 16:08:39 IST 2011

***Deadline extension to February 18, 2011***

[Apologies if you receive multiple copies of this message]


6th International Conference on Security and Cryptography (SECRYPT 2011)
Seville, Spain, July 18-21, 2011

SECRYPT is an annual international conference covering research in
information and communication security. The 6th International
Conference on Security and Cryptography (SECRYPT 2011) will be held in
Seville, Spain. The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography. Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged. The conference topics include, but are not limited

- Access Control
- Applied Cryptography
- Biometrics Security and Privacy
- Critical Infrastructure Protection
- Data Integrity
- Data Protection
- Database Security and Privacy
- Digital Forensics
- Digital Rights Management
- Ethical and Legal Implications of Security and Privacy
- Human Factors and Human Behaviour Recognition Techniques
- Identification, Authentication and Non-repudiation
- Identity Management
- Information Hiding
- Information Systems Auditing
- Insider Threats and Countermeasures
- Intellectual Property Protection
- Intrusion Detection & Prevention
- Management of Computing Security
- Network Security
- Organizational Security Policies
- Peer-to-Peer Security
- Personal Data Protection for Information Systems
- Privacy
- Reliability and Dependability
- Risk Assessment
- Secure Cloud Computing
- Secure Software Development Methodologies
- Security and Privacy in Mobile Systems
- Security and Privacy in Complex Systems
- Security and Privacy in IT Outsourcing
- Security and Privacy in Location-based Services
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in Social Networks
- Security and Privacy in Web Services
- Security and Privacy Policies
- Security Area Control
- Security Deployment
- Security Engineering
- Security for Grid Computing
- Security in Distributed Systems
- Security Information Systems Architecture and Design and Security
- Security Management
- Security Metrics and Measurement
- Security Requirements (Threats, Vulnerabilities, Risk, Formal
  Methods, etc.)
- Security Verification and Validation
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and QoS Network Security
- Software Security
- Trust Management and Reputation Systems
- Ubiquitous Computing Security
- Wireless Network Security (WiFi, WiMAX, WiMedia and others) 

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted: 

- Full Paper: A regular paper presents a work where the research is
  completed or almost finished. Authors of regular submitted papers
  will indicate at the time of submission whether they would like
  their paper to also be considered for publication as a position
- Position Paper: A position paper presents results that are
  preliminary or that simply require few pages to describe. A position
  paper may be a short report and discussion of ideas, facts,
  situations, methods, procedures or results of scientific research
  (bibliographic, experimental, theoretical, or other) focused on one
  of the conference topics. The acceptance of a position paper is
  restricted to the categories of "short paper" or "poster".

Submitted papers must be formatted according to the SECRYPT format
(apart for blinding authors), which is described at
http://secrypt.icete.org/paper_formats.asp. Submission page limit is
10 pages for regular paper and 6 pages for position papers. Accepted
papers will be subject to the limit of: 10 pages (for full papers), 6
pages (for short papers), and 4 pages (for posters). Submitted papers
will be subject to a double-blind review process. All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings. A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book. Authors of
accepted papers/posters must guarantee that their papers will be
presented at the conference.

Full Paper submission: February 18, 2011 (midnight Samoa time) *FIRM DEADLINE*
Authors Notification (full papers): April 16, 2011 
Final Full Paper Submission and Registration: May 5, 2011

Mohammad S. Obaidat, Monmouth University, U.S.A.
Jose Sevillano, University of Seville, Spain 

Pierangela Samarati, Universita' degli Studi di Milano, Italy 
Javier Lopez, University of Malaga, Spain

Claudio Ardagna, Universita' degli Studi di Milano, Italy
Ken Barker, University of Calgary, Canada
Giampaolo Bella, Universita' di Catania, Italy
Marina Blanton, University of Notre Dame, United States
Carlo Blundo, Universita' degli Studi di Salerno, Italy
Gil Pino Caballero, Universidad De La Laguna, Spain
David Chadwick, University of Kent, United Kingdom
Jorge Cuellar, Siemens AG, Germany
Frederic Cuppens, Ecole Nationale De Telecommunications De Bretagne, France
Paolo D'Arco, Universita' degli Studi di Salerno, Italy
Jorge Davila, UPM, Spain
Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
Josep Domingo-ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, United States
Eduardo Fernandez-Medina, University of Castilla-La Mancha, Spain
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
Simone Fischer-Hubner, Karlstad University, Sweden
Sara Foresti, Universita' degli Studi di Milano, Italy
Keith Frikken, Miami University of Ohio, United States
Steven Furnell, University of Plymouth, United Kingdom
Amparo Fuster-Sabater, C.S.I.C., Spain
Rafael M. Gasca, University of Seville, Spain
Antonio Gomez-Skarmeta, University of Murcia, Spain
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Ragib Hasan, Johns Hopkins University, United States
Jordi Herrera, UAB, Spain
Jiankun Hu, RMIT University, Australia
Michael Huth, Imperial College London, United Kingdom
Cynthia Irvine, Naval Postgraduate School, United States
Audun Josang, QUT, Australia
Sokratis Katsikas, University of Piraeus, Greece
Stefan Katzenbeisser, Technische Universitat Darmstadt, Germany
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China
Olivier Markowitch, Universite Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero, Pontifical Catholic University, Brazil
Jorge Guajardo Merchan, Philips Research Eindhoven, Netherlands
Chris Mitchell, Royal Holloway, University of London, United Kingdom
Marco Casassa Mont, Hewlett-Packard Laboratories, United Kingdom
Juan Gonzalez Nieto, Queensland University of Technology, Australia
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, Esecurity Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Gerardo Pelosi, Politecnico di Milano, Italy
Gunther Pernul, University of Regensburg, Germany
Alessandro Piva, Universita' degli Studi di Firenze, Italy
Joachim Posegga, Inst. of IT Security and Security Law, Germany
Kui Ren, Illinois Institute of Technology, United States
Carlos Ribeiro, IST, Portugal
Neeraj Suri, Technische Universitat Darmstadt, Germany
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, University of York, United Kingdom
Marianthi Theoharidou, AUEB, Greece
Lingyu Wang, Concordia University, Canada
Yang Xiang, Central Queensland University, Australia
Alec Yasinsac, University of South Alabama, United States
Nicola Zannone, Eindhoven University of Technology, The Netherlands
Justin Zhang, North Carolina A&T State University, USA
Jianying Zhou, Institute For Infocomm Research, Singapore
Bo Zhu, Concordia Univerity, Canada 

This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chairs:
secrypt2011 at unimi.it

More information about the FMIndia mailing list