[FM-India] Deadline Approaching - 10th International Conference on Security and Cryptography (SECRYPT 2013)

SECRYPT 2013 secrypt2013 at unimi.it
Fri Mar 15 04:20:05 IST 2013

[Apologies if you receive multiple copies of this message]

*** Deadline approaching - March 18, 2013 ***


10th International Conference on Security and Cryptography (SECRYPT 2013)
Reykjavik, Iceland, July 29-31, 2013

SECRYPT is an annual international conference covering research in
information and communication security.  The 10th International
Conference on Security and Cryptography (SECRYPT 2013) will be held in
Rome, Italy.  The conference seeks submissions from academia,
industry, and government presenting novel research on all theoretical
and practical aspects of data protection, privacy, security, and
cryptography.  Papers describing the application of security
technology, the implementation of systems, and lessons learned are
also encouraged.  The conference topics include, but are not limited

Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security

Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings.  All submissions should be appropriately
anonymized (i.e., papers should not contain author names or
affiliations, or obvious citations). Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Two categories of papers can be submitted: 

- Full Paper: A regular paper presents a work where the research is
 completed or almost finished.  Authors of regular submitted papers
 will indicate at the time of submission whether they would like
 their paper to also be considered for publication as a position
- Position Paper: A position paper presents results that are
 preliminary or that simply require few pages to describe. A position
 paper may be a short report and discussion of ideas, facts,
 situations, methods, procedures or results of scientific research
 (bibliographic, experimental, theoretical, or other) focused on one
 of the conference topics. The acceptance of a position paper is
 restricted to the categories of "short paper" or "poster".

Submitted papers must be formatted according to the SECRYPT format
(apart for blinding authors), which is described at
http://secrypt.icete.org/GuidelinesTemplates.aspx.  Submission page limit is
12 pages for regular paper and 6 pages for position papers. Accepted
papers will be subject to the limit of: 12 pages (for full papers), 6
pages (for short papers or posters).  Submitted papers
will be subject to a double-blind review process.  All submissions
should be anonymized. All accepted papers/posters will be published in
the conference proceedings.  A short list of presented papers will be
selected so that revised and extended versions of these papers will be
published by Springer-Verlag in a CCIS Series book.  Authors of
accepted papers/posters must guarantee that their papers will be
presented at the conference.

Full Paper submission: March 18, 2013 (11:59 p.m. American Samoa time) [extended]
Authors Notification (full papers): May 6, 2013 

Mohammad S. Obaidat, Monmouth University, U.S.A.

Pierangela Samarati, Universita' degli Studi di Milano, Italy 


Alessandro Armando, Fondazione Bruno Kessler, Italy
Carlos Blanco Bueno, University of Cantabria, Spain		
Carlo Blundo, Universita' di Salerno, Italy
Michael Brenner, Leibniz Universitat Hannover, Germany		
Marco Casassa-Mont, Hewlett-Packard Laboratories, UK
David Chadwick,	University of Kent, UK		
Frederic Cuppens, Telecom Bretagne, France
Nora Cuppens, Telecom Bretagne, France
Reza Curtmola, New Jersey Institute of Tech, USA
Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre, Italy
Tassos Dimitriou, Athens Information Technology, Greece
Josep Domingo-Ferrer, Rovira I Virgili University of Tarragona, Spain
Eduardo B. Fernandez, Florida Atlantic University, USA
Alberto Ferrante, University of Lugano, Switzerland
Pep Ll. Ferrer, Balearic Islands University, Spain
William Fitzgerald, University College Cork, Ireland			
Sara Foresti, Universita' degli Studi di Milano, Italy	
Steven Furnell, University of Plymouth, UK
Joaquin Garcia Alfaro, Telecom Bretagne, France
David Garcia Rosado, Universidad de Castilla-La Mancha, Spain
Mark Gondree, Naval Postgraduate School, USA
Dimitris Gritzalis, AUEB, Greece			
Stefanos Gritzalis, University of the Aegean, Greece
Yong Guan, Iowa State University, USA
Sokratis Katsikas, University of Piraeus, Greece
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China
Adam J. Lee, University	of Pittsburgh, USA
Patrick Lee, Chinese University of Hong Kong, Hong Kong
Albert Levi, Sabanci University, Turkey				
Jiguo Li, Hohai University, China				
Ming Li, Utah State University, USA		
Antonio Lioy, Politecnico di Torino, Italy			
Giovanni Livraga, Universita' degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Haibing Lu, Santa Clara University, USA
Emil Lupu, Imperial College, UK
Olivier Markowitch, Universite' Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero,	Federal University of Technology, Brazil
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Chris Mitchell, Royal Holloway, University of London, UK
Atsuko Miyaji, Japan Advanced Institute of Science and Technology, Japan
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, Universita' degli Studi di Bergamo, Italy
Joon Park, Syracuse University, USA
Gunther Pernul, University of Regensburg, Germany
Joachim Posegga, Institute of IT Security and Security Law, Germany
Silvio Ranise, Fondazione Bruno Kessler, Italy
Kui Ren, Kui Ren, University at Buffalo, State University of New York, USA
Nicolas Sklavos, Technological Educational Institute of Patras, Greece
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Vincen Torra, Artificial Intelligence Research Institute, Catalonia			
Jaideep Vaidya, Rutgers State University of New Jersey, USA
Luca Vigano', Universita' di Verona, Italy				
Lingyu Wang, Concordia University, Canada
Ping Wang, University of Central Florida, USA
Haining Wang, The College of William and Mary, USA
Cong Wang, City University of Hong Kong, Hong Kong
Alec Yasinsac, University of South Alabama, USA
Meng Yu, VCU Engineering, USA
Lei Zhang, Google Inc., USA
Jianying Zhou, Institute for Infocomm Research, Singapore

This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chair:
secrypt2013 at unimi.it

More information about the FMIndia mailing list