| |||||||||||||
SECRYPT 2015 : 12th International Conference on Security and CryptographyConference Series : International Conference on Security and Cryptography | |||||||||||||
Link: http://secrypt.icete.org | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
*** Deadline extended to March 17, 2015 ***
************************************************************************ 12th International Conference on Security and Cryptography (SECRYPT 2015) Colmar, France, 20-22 July 2015 http://secrypt.icete.org ************************************************************************ SECRYPT is an annual international conference covering research in information and communication security. The 12th International Conference on Security and Cryptography (SECRYPT 2015) will be held in Colmar, France, 20-22 July 2015. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. CONFERENCE TOPICS The conference topics include, but are not limited to: Access Control Applied Cryptography Biometrics Security and Privacy Critical Infrastructure Protection Data Integrity Data Protection Database Security and Privacy Digital Forensics Digital Rights Management Ethical and Legal Implications of Security and Privacy Formal Methods for Security Human Factors and Human Behavior Recognition Techniques Identification, Authentication and Non-repudiation Identity Management Information Hiding Information Systems Auditing Insider Threats and Countermeasures Intellectual Property Protection Intrusion Detection & Prevention Management of Computing Security Network Security Organizational Security Policies Peer-to-Peer Security Personal Data Protection for Information Systems Privacy Privacy Enhancing Technologies Reliability and Dependability Risk Assessment Secure Software Development Methodologies Security and privacy in Complex Systems Security and Privacy in Crowdsourcing Security and Privacy in IT Outsourcing Security and Privacy in Location-based Services Security and Privacy in Mobile Systems Security and Privacy in Pervasive/Ubiquitous Computing Security and Privacy in Smart Grids Security and Privacy in Social Networks Security and Privacy in the Cloud Security and Privacy in Web Services Security and Privacy Policies Security Area Control Security Deployment Security Engineering Security in Distributed Systems Security Information Systems Architecture Security Management Security Metrics and Measurement Security Protocols Security requirements Security Verification and Validation Sensor and Mobile Ad Hoc Network Security Service and Systems Design and QoS Network Security Software Security Trust management and Reputation Systems Ubiquitous Computing Security Wireless Network Security PAPER SUBMISSIONS Submitted papers must be in English and must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions are to be made to the submission web site at http://www.insticc.org/primoris/. Papers can be submitted as REGULAR or POSITION papers. - REGULAR Paper: Regular papers present work where research is completed. They can be up to 12 pages. Authors of regular submitted papers will indicate at the time of submission whether they would like their paper to also be considered for publication as a position paper. - POSITION Paper: A position paper presents results that are preliminary or that simply require fewer pages to describe. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (theoretical or experimental) on one of the conference topics. The acceptance of a position paper is restricted to the categories of "short paper" Submitted papers must be formatted according to the SECRYPT format, which is described at http://secrypt.icete.org/GuidelinesTemplates.aspx. Submission page limit is 12 pages for regular paper and 8 pages for position papers. Accepted papers will be subject to the limit of: 12 pages for full papers, 8 pages for short papers with oral presentation, and 6 pages for short papers with poster presentation. Authors of accepted papers must guarantee that their papers will be presented at the conference. All papers presented in the conference will be published in the conference proceedings and in the digital library. A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book. IMPORTANT DATES Regular and Position Papers - Paper Submission: March 17, 2015 (11:59 PM American Samoa Time) [extended] - Authors Notification: May 16, 2015 - Camera Ready and Registration: June 1, 2015 Second call for Position Papers only: - Paper Submission: April 17, 2015 - Authors Notification: May 18, 2015 - Camera Ready and Registration: June 1, 2015 PROGRAM CHAIR Pierangela Samarati, Universita' degli Studi di Milano, Italy PROGRAM COMMITTEE Alessandro Armando, FBK, Italy Reza Azarderakhsh, Rochester Institute of Technology, United States Prithvi Bisht, Adobe, United States Carlo Blundo, Universita' di Salerno, Italy Andrey Bogdanov, Technical University of Denmark, Denmark Francesco Buccafurri, University of Reggio Calabria, Italy Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong Frederic Cuppens, TELECOM Bretagne, France Nora Cuppens-Boulahia, Institut Mines Telecom / Telecom Bretagne, France Jun Dai, California State University at Sacramento, United States Sabrina De Capitani di Vimercati, Universita' degli Studi di Milano, Italy Roberto Di Pietro, Universita' di Roma Tre, Italy Tassos Dimitriou, Computer Technology Institute, Greece and Kuwait University, Kuwait Ruggero Donida Labati, Universita' degli Studi di Milano, Italy Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain Bao Feng, Security and Privacy Lab, Huawei, Singapore Alberto Ferrante, Universita' della Svizzera italiana, Switzerland Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain William M. Fitzgerald, United Technologies Research Center Ireland (UTRCI), Ireland Sara Foresti, Universita' degli Studi di Milano, Italy Steven Furnell, Plymouth University, United Kingdom Joaquin Garcia-Alfaro, Institut Mines-Telecom, TELECOM SudParis, France Dieter Gollmann, Tu Hamburg-Harburg, Germany Mark Gondree, Naval Postgraduate School, United States Dimitris A. Gritzalis, Athens University of Economics & Business, Greece Sotiris Ioannidis, Foundation for Research and Technology - Hellas, Greece Wael Kanoun, Bell Labs, France Sokratis Katsikas, University of Piraeus, Greece Florian Kerschbaum, SAP, Germany Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan Costas Lambrinoudakis, University of Piraeus, Greece Adam Lee, University of Pittsburgh, United States Patrick P. C. Lee, The Chinese University of Hong Kong, Hong Kong Albert Levi, Sabanci University, Turkey Ming Li, Utah State University, United States Jiguo Li, Hohai University, China Peng Liu, Penn. State University, United States Giovanni Livraga, Universita degli Studi di Milano, Italy Javier Lopez, University of Malaga, Spain Haibing Lu, Santa Clara University, United States Emil Lupu, Imperial College London, United Kingdom Olivier Markowitch, Universite' Libre de Bruxelles, Belgium Fabio Martinelli, IIT-CNR, Italy Vashek Matyas, Masaryk University, Czech Republic Carlos Maziero, UTFPR - Federal University of Technology - Paraná state, Brazil Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan Mehran Mozaffari-Kermani, Rochester Institute of Technology, United States Eiji Okamoto, University of Tsukuba, Japan Rolf Oppliger, eSECURITY Technologies, Switzerland Stefano Paraboschi, University of Bergamo, Italy Joon Park, Syracuse University, United States Gerardo Pelosi, Politecnico di Milano, Italy Gunther Pernul, University of Regensburg, Germany Joachim Posegga, Institute of IT Security and Security Law, Germany Silvio Ranise, Fondazione Bruno Kessler, Italy Kui Ren, state university of new york at buffalo, United States Andreas Schaad, Huawei Research, Germany Daniele Sgandurra, Imperial College, London, United Kingdom Nicolas Sklavos, Technological Educational Institute of Western Greece, Greece Einar Snekkenes, Gjøvik University College, Norway Alessandro Sorniotti, IBM Research - Zurich, Switzerland Willy Susilo, University of Wollongong, Australia Juan Tapiador, Universidad Carlos III de Madrid, Spain Vicenc Torra, U. of Skövde, Sweden Jaideep Vaidya, Rutgers Business School, United States Luca Vigano’, University of Verona, Italy Haining Wang, The College of William and Mary, United States Xinyuan (Frank) Wang, George Mason University, United States Ping Wang, Symantec Corporation, United States Cong Wang, City University of Hong Kong, Hong Kong Lingyu Wang, Concordia University, Canada Edgar Weippl, SBA Research / TU Wien, Austria Meng Yu, Virginia Commonwealth University, United States Lei Zhang, Thomson Reuters, United States Hang Zhao, Columbia University, United States Jianying Zhou, Institute for Infocomm Research, Singapore For any questions, please contact the program chair: secrypt2015@unimi.it |
|