| |||||||||||||||
SECRYPT 2018 : 15th International Conference on Security and CryptographyConference Series : International Conference on Security and Cryptography | |||||||||||||||
Link: http://www.secrypt.icete.org/ | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
CALL FOR PAPERS
15th International Conference on Security and Cryptography SECRYPT website: http://www.secrypt.icete.org/ July 26 - 28, 2018 Porto, Portugal Sponsored by: INSTICC INSTICC is Member of: WfMC and OMG Logistics Partner: SCITEVENTS IMPORTANT DATES: Regular Paper Submission: March 13, 2018 Authors Notification (regular papers): May 14, 2018 Final Regular Paper Submission and Registration: May 28, 2018 Scope: SECRYPT is an annual international conference covering research in information and communication security. The 15th International Conference on Security and Cryptography (SECRYPT 2018) will be held in Porto, Portugal on 26-28 July 2018. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged. Conference Topics: Area 1: SECRYPT - International Conference on Security and Cryptography - Access Control - Applied Cryptography - Biometrics Security and Privacy - Critical Infrastructure Protection - Data Integrity - Data Protection - Database Security and Privacy - Digital Forensics - Digital Rights Management - Ethical and Legal Implications of Security and Privacy - Formal Methods for Security - Human Factors and Human Behavior Recognition Techniques - Identification, Authentication and Non-repudiation - Identity Management - Information Hiding - Information Systems Auditing - Insider Threats and Countermeasures - Intellectual Property Protection - Intrusion Detection & Prevention - Management of Computing Security - Network Security - Organizational Security Policies - Peer-to-Peer Security - Personal Data Protection for Information Systems - Privacy - Privacy Enhancing Technologies - Reliability and Dependability - Risk Assessment - Secure Software Development Methodologies - Security and Privacy for Big Data - Security and privacy in Complex Systems - Security and Privacy in Crowdsourcing - Security and Privacy in IT Outsourcing - Security and Privacy in Location-based Services - Security and Privacy in Mobile Systems - Security and Privacy in Pervasive/Ubiquitous Computing - Security and Privacy in Smart Grids - Security and Privacy in Social Networks - Security and Privacy in the Cloud - Security and Privacy in Web Services - Security and Privacy Policies - Security Area Control - Security Deployment - Security Engineering - Security in Distributed Systems - Security Information Systems Architecture - Security Management - Security Metrics and Measurement - Security Protocols - Security requirements - Security Verification and Validation - Sensor and Mobile Ad Hoc Network Security - Service and Systems Design and QoS Network Security - Software Security - Trust management and Reputation Systems - Ubiquitous Computing Security - Wireless Network Security SECRYPT CONFERENCE CHAIR: Mohammad S. Obaidat, Fordham University, United States SECRYPT PROGRAM CHAIR: Pierangela Samarati, UniversitĂ degli Studi di Milano, Italy PROGRAM COMMITTEE http://www.secrypt.icete.org//ProgramCommittee.aspx SECRYPT Secretariat Address: Av. D. Manuel I, 27A, 2Âș esq. Tel: +351 265 520 185 Fax: +351 265 520 186 Web: http://www.secrypt.icete.org/ e-mail: secrypt.secretariat@insticc.org |
|