| |||||||||||||||
Online Live SecITC 2020 : International Conference on Information Technology and Communications | |||||||||||||||
Link: http://www.secitc.eu | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The 13th International Conference on Security for Information Technology and Communications (SECITC 2020) will be held on November 19-20, 2020. Due to the CoVID situation and restrictions, the conference will take place online via Zoom platform. The researchers all around the world may join online.
SECITC brings together computer security researchers, cryptographers, industry representatives and graduate students interested in any aspect of information security and privacy. One of SECITC’s primary goal is connecting security and privacy researchers as well as professionals from different communities and providing a forum that allows informal exchanges necessary for the emergence of new scientific and industrial collaborations. SECITC 2019 post-proceedings were published by Springer as LNCS vol. 12001, SECITC 2018 post-proceedings were published by Springer as LNCS vol. 11359, SECITC 2017 post-proceedings were published by Springer as LNCS vol. 10543, SECITC 2016 post-proceedings were published by Springer as LNCS vol. 10006 and for SECITC 2015 post-proceedings were published by Springer as LNCS vol. 9522 in a book titled “Innovative Security Solutions for Information Technology and Communications”. Paper submission and refereeing for SECITC 2020 will take place via EasyChair and the post-proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series. The conference topics comprise all aspects of information security, including but not limited to the following areas: Access control, Algorithmic Tools for Security and Cryptography, Application security, Attacks and defences, Authentication Biometry, Blockchain Security and Security aspects of alternative currencies, Censorship and censorship-resistance, Cloud and Web Security, Cryptography, biometric and watermarking, Cryptology Distributed systems security, Embedded systems security, Digital forensics, Hardware security, Information flow analysis, Internet of Things (IoT) Security, Intrusion detection and prevention system, Language-based security, Malware and Ransomware, Mobile security, Network security, New exploits, Policy enforcements, Privacy and anonymity, Protocol security, Reverse-engineering and code obfuscation, Security architectures, Side channel attacks, Surveillance and anti-surveillance, System security. |
|