posted by user: Calendar_Sites || 4656 views || tracked by 10 users: [display]

SECRYPT 2010 : International Conference on Security and Cryptography (SECRYPT)

FacebookTwitterLinkedInGoogle

Link: http://www.secrypt.icete.org
 
When Jul 26, 2010 - Jul 28, 2010
Where Athens, Greece
Abstract Registration Due Feb 26, 2010
Submission Deadline Mar 25, 2010
Notification Due Apr 26, 2010
Final Version Due May 6, 2010
Categories    security   cryptography
 

Call For Papers

Conference name: International Conference on Security and Cryptography (SECRYPT)

Venue: Athens - Greece


Event Date: 26-28 July, 2010

The purpose of SECRYPT 2010, the International Conference on Security and Cryptography, is to bring together researchers, engineers and practitioners interested on information systems and applications in the context of wireless networks and mobile technologies.

CONFERENCE AREAS

* › Access Control and Intrusion Detection
* › Network Security and Protocols
* › Cryptographic Techniques and Key Management
* › Information Assurance
* › Security in Information Systems and Software Engineering

Area 1: Access Control and Intrusion Detection


* › Intrusion Detection and Vulnerability Assessment
* › Identification, Authentication and Non-repudiation
* › Insider Threats and Countermeasures
* › Intrusion Detection & Prevention
* › Biometric Security
* › Regulation and Trust Mechanisms
* › Data Integrity
* › Models for Authentication, Trust and Authorization
* › Access Control in Computing Environments
* › Data Access & Synchronization
* › Security in Distributed Systems

Area 2: Network Security and Protocols


* › IPsec, VPNs and Encryption Modes
* › Service and Systems Design and QoS Network Security
* › Reliability and Dependability
* › Web Performance and Reliability
* › Denial of Service and Other Attacks
* › Data and Systems Security
* › Mobile System Security
* › Ubiquitous Computing Security
* › Sensor and Mobile Ad Hoc Network Security
* › Wireless Network Security (WiFi, WiMAX, WiMedia and Others)
* › Peer-to-Peer Security
* › Phishing, adfraud, malware, and countermeasures
* › Active Defense Systems

Area 3: Cryptographic Techniques and Key Management


* › Smart Card Security
* › Public Key Crypto Applications
* › Coding Theory and Practice
* › Speech/Image Coding
* › Shannon Theory
* › Mobile Code & Agent Security
* › Digital Rights Management
* › Digital Forensics

Area 4: Information Assurance


* › Planning Security
* › Risk Assessment
* › Security Area Control
* › Organizational Security Policies and Responsability
* › Security Through Collaboration
* › Human Factors and Human Behaviour Recognition Techniques
* › Ethical and Legal Implications
* › Information Hiding
* › Information Systems Auditing
* › Management of Computing Security
* › Intellectual Property Protection

Area 5: Security in Information Systems and Software Engineering


* › Secure Software Development Methodologies
* › Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
* › Security Information Systems Architecture and Design and Security Patterns
* › Security Implementation
* › Security Verification and Validation
* › Security Deployment
* › Security for Grid Computing and Web Services
* › Security Engineering
* › Security Metrics and Measurement
* › Personal Data Protection for Information Systems



IMPORTANT DATES

› Conference date: 26-28 July, 2010

Position Paper Submission: March 25, 2010
Authors Notification (position papers): April 26, 2010
Final Position Paper Submission and Registration: May 06, 2010

Conference Co-chairs
Mohammad S. Obaidat, Monmouth University, U.S.A
George A. Tsihrintzis, University of Piraeus, Greece





Contacts:

SECRYPT Secretariat
Adress: Av. D. Manuel I, 27A, 2º esq.
2910-595 Setúbal - Portugal

Tel.: +351 265 520 185
Fax: +44 203 014 5432



Event Site: http://www.secrypt.icete.org/

Event E-mail:secrypt.secretariat@insticc.org

Related Resources

ICSIE 2027   2027 15th International Conference on Software and Information Engineering (ICSIE 2027)
CIOS 2026   4th International Conference on Cloud, IoT and Security
AICS 2026   The 2026 International Conference on Artificial Intelligence and Cyber Security (AICS 2026)
IJSPTM 2026   International Journal of Security, Privacy and Trust Management
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
IJCIS 2026   International Journal on Cryptography and Information Security
IFSP--EI 2026   2026 The 6th International Forum on Signal Processing (IFSP 2026)
AI-EE 2026   2026 International Conference on Artificial Intelligence and Electrical Engineering-EI/Scopus
SCECS 2026   2026 12th International Conference on Sensor-Cloud and Edge Computing System
EIBDCT 2026   2026 5th International Conference on Electronic Information Engineering, Big Data and Computer Technology