[FM-India] Deadline extended - 11th International Conference on Security and Cryptography (SECRYPT 2014)

SECRYPT 2014 secrypt2014 at unimi.it
Sat Apr 12 15:41:21 IST 2014


[Apologies if you receive multiple copies of this message]


*** Deadline extended to April 29, 2014 ***


CALL FOR PAPERS

************************************************************************
11th International Conference on Security and Cryptography (SECRYPT 2014)
Vienna, Austria, August 28-30, 2014
http://secrypt.icete.org
************************************************************************


SECRYPT is an annual international conference covering research in 
information and communication security.  The 11th International 
Conference on Security and Cryptography (SECRYPT 2014) will be held in 
Vienna, Austria on 28-30 August 2014. The conference seeks submissions 
from academia, industry, and government presenting novel research on 
all theoretical and practical aspects of data protection, privacy, 
security, and cryptography. Papers describing the application of security 
technology, the implementation of systems, and lessons learned are 
also encouraged. The conference topics include, but are not limited to:

Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security


PAPER SUBMISSIONS
Submitted papers must be in English and must not substantially overlap 
with papers that have been published or that are simultaneously submitted 
to a journal or a conference with proceedings.   Submissions are to be 
made to the submission web site at http://www.insticc.org/Primoris.

Papers can be submitted as REGULAR or POSITION papers.

- REGULAR Paper:  Regular papers present work where research is completed. 
They can be up to 12 pages. 
Authors of regular submitted papers will indicate at the time of 
submission whether they would like their paper to also be considered for 
publication as a position paper.

- POSITION Paper: A position paper presents results that are preliminary 
or that simply require fewer pages to describe. A position paper may be 
a short report and discussion of ideas, facts, situations, methods, 
procedures or results of scientific research (theoretical or experimental) 
on one of the conference topics. The acceptance of a position paper is 
restricted to the categories of "short paper" 

Submitted papers must be formatted according to the SECRYPT format, 
which is described at http://secrypt.icete.org/GuidelinesTemplates.aspx.  

Submission page limit is 12 pages for regular papers and 8 pages for 
position papers. Accepted papers will be subject to the limit of: 12 pages 
for full papers, 8 pages for short papers with oral presentation, and 6 
pages for short paper with poster presentation. Authors of accepted papers 
must guarantee that their papers will be presented at the conference. All 
papers presented at the conference will be published in the conference 
proceedings and in the digital library. A short list of presented papers 
will be selected so that revised and extended versions of these papers 
will be published by Springer-Verlag in a CCIS Series book.  


IMPORTANT DATES
Regular and Position Papers
- Paper Submission: April 29, 2014 (23:59 American Samoa time) [extended]
- Authors Notification: June 16, 2014
- Camera Ready and Registration: June 30, 2014

Second call for Position Papers only:
- Paper Submission: May 23, 2014
- Authors Notification: June 27, 2014
- Camera Ready and Registration: July 9, 2014


PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy 


PROGRAM COMMITTEE

Ehab Al-Shaer, UNC Charlotte, USA
Alessandro Armando, FBK, Italy 
Prithvi Bisht, University of Illinois at Chicago, Unites States
Carlo Blundo, Università di Salerno, Italy 
Andrey Bogdanov, Technical University of Denmark, Denmark 
Frederic  Cuppens, TELECOM Bretagne, France 
Nora Cuppens-Boulahia, TELECOM, France 
Sabrina  De Capitani di Vimercati, Università degli Studi di Milano, Italy 
Roberto Di Pietro, Universita' di Roma Tre, Italy 
Tassos Dimitriou, Athens Information Technology, Greece 
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain 
Ruggero Donida Labati, Università degli Studi di Milano, Italy 
Alberto Ferrante, University of Lugano, Switzerland
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain 
William Fitzgerald, EMC Information Systems International, Ireland 
Sara Foresti, Universita' degli Studi di Milano, Italy 
Steven Furnell, Plymouth University, United Kingdom 
Joaquin Garcia-Alfaro, Institut Mines-Telecom, TELECOM SudParis, France 
Mark Gondree, Naval Postgraduate School, United States 
Dimitris Gritzalis, AUEB, Greece 
Stefanos Gritzalis, University of the Aegean , Greece 
Sokratis Katsikas, University of Piraeus, Greece 
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan 
Yong Guan, Iowa State University, United States
Kostas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China 
Patrick P. C. Lee , Chinese University of Hong Kong, Hong Kong 
Adam J. Lee , University of Pittsburgh, United States 
Albert Levi, Sabanci University, Turkey 
Jiguo Li, Hohai University, China 
Ming Li, Utah State University, United States 
Giovanni Livraga, Universita degli Studi di Milano, Italy 
Javier Lopez, University of Malaga, Spain 
Haibing Lu, Santa Clara University, United States 
Emil Lupu, Imperial College, United Kingdom 
Olivier Markowitch, Université Libre de Bruxelles, Belgium 
Vashek Matyas, Masaryk University, Czech Republic 
Carlos Maziero, UTFPR - Federal University of Technology - Paraná state, Brazil 
Wojciech Mazurczyk, Warsaw University of Technology, Poland 
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan 
David Naccache, Ecole Normale Superieure, France 
Eiji Okamoto, University of Tsukuba, Japan 
Rolf Oppliger, eSECURITY Technologies, Switzerland 
Stefano Paraboschi, University of Bergamo, Italy 
Joon Park, Syracuse University, United States 
Gerardo Pelosi, Politecnico di Milano, Italy
Günther Pernul, University of Regensburg, Germany 
Joachim Posegga, University of Passau, Germany
Silvio Ranise, Fondazione Bruno Kessler, Italy 
Kui Ren, State University of New York at Buffalo, United States 
Nicolas Sklavos, Technological Educational Institute of Patras, Greece 
Alessandro Sorniotti, IBM Research, Switzerland 
Willy Susilo, University of Wollongong, Australia 
Juan Tapiador, Universidad Carlos III de Madrid, Spain 
Vicenc Torra, IIIA-CSIC, Spain 
Jaideep Vaidya, Rutgers Business School, United States 
Luca  Viganò, King’s College London, United Kingdom
Xinyuan (Frank) Wang, George Mason University , United States 
Haining  Wang, The College of William and Mary, United States 
Ping Wang, Symantec Corporation, United States 
Cong Wang, City University of Hong Kong, Hong Kong 
Lingyu Wang, Concordia University, Canada 
Edgar Weippl, Vienna University of Technology, Austria
Alec Yasinsac, University of South Alabama, United States 
Meng Yu, Virginia Commonwealth University, United States 
Lei Zhang, Thomson Reuters, United States


This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chair:
secrypt2014 at unimi.it


More information about the FMIndia mailing list