[FM-India] Call for position papers - 10th International Conference on Security and Cryptography (SECRYPT 2013)

SECRYPT 2013 secrypt2013 at unimi.it
Tue Apr 9 14:21:10 IST 2013


[Apologies if you receive multiple copies of this message]


*** Position papers deadline - April 24, 2013 ***


CALL FOR POSITION PAPERS

************************************************************************
10th International Conference on Security and Cryptography (SECRYPT 2013)
Reykjavik, Iceland, July 29-31, 2013
http://secrypt.icete.org
************************************************************************

The International Conference on Security and Cryptography
(SECRYPT 2013 - http://secrypt.icete.org), to be held in Reykjavik, Iceland, 
July 29-31, 2013, is now welcoming the submission of position papers whose 
deadline is scheduled for next April 24.

Position papers can be 4-6 pages and should be submitted in anonymous form. 
Submissions will be subject to a double-blind review process. Accepted position 
papers will appear in the conference proceedings, under an ISBN reference, on 
paper and on CD-ROM support. The proceedings will be submitted for indexation 
by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP 
and Elsevier Index (EI). All papers presented at the conference venue will be 
available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/). 
SciTePress is member of CrossRef (http://www.crossref.org/).

The conference seeks submissions from academia, industry, and government 
presenting novel research on all theoretical and practical aspects of data 
protection, privacy, security, and cryptography.  Papers describing the 
application of security technology, the implementation of systems, and lessons 
learned are also encouraged.  The conference topics include, but are not 
limited to:

Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security


POSITION PAPER SUBMISSIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or a
conference with proceedings. Submissions are to be made to the
submission web site at http://www.insticc.org/Primoris.

Submitted papers must be formatted according to the SECRYPT format
(apart for blinding authors), which is described at
http://secrypt.icete.org/GuidelinesTemplates.aspx. Submitted papers
will be subject to a double-blind review process. All submissions
should be anonymized. All accepted papers will be published in
the conference proceedings.   Authors of
accepted papers must guarantee that their papers will be
presented at the conference.


IMPORTANT DATES
Position Paper submission: April 24, 2013 (11:59 p.m. American Samoa time) 
Authors Notification: May 16, 2013 

CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy 


PROGRAM COMMITTEE

Alessandro Armando, Fondazione Bruno Kessler, Italy
Carlos Blanco Bueno, University of Cantabria, Spain		
Carlo Blundo, Universita' di Salerno, Italy
Andrey Bogdanov, Technical University of Denmark, Denmark
Michael Brenner, Leibniz Universitat Hannover, Germany		
Marco Casassa-Mont, Hewlett-Packard Laboratories, UK
David Chadwick,	University of Kent, UK		
Frederic Cuppens, Telecom Bretagne, France
Nora Cuppens, Telecom Bretagne, France
Reza Curtmola, New Jersey Institute of Tech, USA
Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre, Italy
Tassos Dimitriou, Athens Information Technology, Greece
Josep Domingo-Ferrer, Rovira I Virgili University of Tarragona, Spain
Ruggero Donida Labati, Universita' degli Studi di Milano, Italy	
Eduardo B. Fernandez, Florida Atlantic University, USA
Alberto Ferrante, University of Lugano, Switzerland
Pep Ll. Ferrer, Balearic Islands University, Spain
William Fitzgerald, University College Cork, Ireland			
Sara Foresti, Universita' degli Studi di Milano, Italy	
Steven Furnell, University of Plymouth, UK
Joaquin Garcia Alfaro, Telecom Bretagne, France
David Garcia Rosado, Universidad de Castilla-La Mancha, Spain
Mark Gondree, Naval Postgraduate School, USA
Dimitris Gritzalis, AUEB, Greece			
Stefanos Gritzalis, University of the Aegean, Greece
Yong Guan, Iowa State University, USA
Sokratis Katsikas, University of Piraeus, Greece
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China
Adam J. Lee, University	of Pittsburgh, USA
Patrick Lee, Chinese University of Hong Kong, Hong Kong
Albert Levi, Sabanci University, Turkey				
Jiguo Li, Hohai University, China				
Ming Li, Utah State University, USA		
Antonio Lioy, Politecnico di Torino, Italy			
Giovanni Livraga, Universita' degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Haibing Lu, Santa Clara University, USA
Emil Lupu, Imperial College, UK
Olivier Markowitch, Universite' Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero,	Federal University of Technology, Brazil
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Alessandro Mei, Sapienza University, Rome, Italy
Chris Mitchell, Royal Holloway, University of London, UK
Atsuko Miyaji, Japan Advanced Institute of Science and Technology, Japan
David Naccache, Ecole Normale Superieure, France
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, Universita' degli Studi di Bergamo, Italy
Joon Park, Syracuse University, USA
Gunther Pernul, University of Regensburg, Germany
Joachim Posegga, Institute of IT Security and Security Law, Germany
Silvio Ranise, Fondazione Bruno Kessler, Italy
Kui Ren, Kui Ren, University at Buffalo, State University of New York, USA
Nicolas Sklavos, Technological Educational Institute of Patras, Greece
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Vincen Torra, Artificial Intelligence Research Institute, Catalonia
Jaideep Vaidya, Rutgers State University of New Jersey, USA
Luca Vigano', Universita' di Verona, Italy				
Lingyu Wang, Concordia University, Canada
Ping Wang, University of Central Florida, USA
Haining Wang, The College of William and Mary, USA
Cong Wang, City University of Hong Kong, Hong Kong
Xinyuan Wang, George Mason University, USA
Alec Yasinsac, University of South Alabama, USA
Meng Yu, VCU Engineering, USA
Lei Zhang, Google Inc., USA
Jianying Zhou, Institute for Infocomm Research, Singapore


This call for position papers and additional information about the conference
can be found at http://secrypt.icete.org/

For any questions, please contact the program chair:
secrypt2013 at unimi.it


More information about the FMIndia mailing list