[Om-announce] Call for Posters - 9th International Conference on Security and Cryptography (SECRYPT 2012)

SECRYPT 2012 secrypt2012 at unimi.it
Sat Apr 7 12:34:07 CEST 2012

[Apologies if you receive multiple copies of this message]

CALL FOR POSTERS (submission deadline April 26, 2012)

9th International Conference on Security and Cryptography (SECRYPT 2012)
Rome, Italy, July 24-27, 2012

The International Conference on Security and Cryptography
(SECRYPT 2012 - http://secrypt.icete.org), to be held in Rome, Italy  
(July 24-27, 2012) is
now welcoming the submission of position (poster) papers whose  
deadline is scheduled for
next April 26.

A position (poster) paper presents an arguable opinion about an issue.  
The goal of a
position paper is to convince the audience that your opinion is valid  
and worth listening
to, without the need to present completed research work and/or  
validated results. It is,
nevertheless, important to support your argument with evidence to  
ensure the validity of
your claims. A position (poster) paper may be a short report and  
discussion of ideas, facts,
situations, methods, procedures or results of scientific research  
experimental, theoretical, or other) focused on one of the conference  
topics.  Please
check further details about position papers submission at the  
conference website

Poster papers can be up to four pages and should be submitted in  
anonymous form.
Submissions will be subject to a double-blind review process.
Accepted posters will appear in the conference proceedings, under an  
ISBN reference,
on paper and on CD-ROM support.
The proceedings will be submitted for indexation by Thomson Reuters  
Conference Proceedings
Citation Index (ISI), INSPEC, DBLP and Elsevier Index (EI).
All papers presented at the conference venue will be available at the  
SciTePress Digital Library
(http://www.scitepress.org/DigitalLibrary/). SciTePress is member of  
CrossRef (http://www.crossref.org/).

The conference program features a number of Keynote Lectures to be  
delivered by distinguished world-class researchers, namely:
- Venu Govindaraju, University at Buffalo, United States
- Sushil Jajodia, George Mason University Fairfax, United States
- Andreas Holzinger, Medical University Graz, Austria
- Geoffrey Charles Fox, Indiana University, United States

Mohammad S. Obaidat, Monmouth University, U.S.A.

Pierangela Samarati, Universita' degli Studi di Milano, Italy

Wenjing Lou, Virginia Polytechnic Institute and State University,  
United States
Jianying Zhou, Institute For Infocomm Research, Singapore


- Access Control
- Applied Cryptography
- Authentication
- Biometrics Security and Privacy
- Critical Infrastructure Protection
- Data Integrity
- Data Protection
- Database Security and Privacy
- Digital Forensics
- Digital Rights Management
- Ethical and Legal Implications of Security and Privacy
- Formal Methods for Security
- Human Factors and Human Behaviour Recognition Techniques
- Identification, Authentication and Non-repudiation
- Identity Management
- Information Hiding
- Information Systems Auditing
- Insider Threats and Countermeasures
- Intellectual Property Protection
- Intrusion Detection & Prevention
- Management of Computing Security
- Network Security
- Organizational Security Policies
- Peer-to-Peer Security
- Personal Data Protection for Information Systems
- Privacy
- Privacy Enhancing Technologies
- Reliability and Dependability
- Risk Assessment
- Secure Cloud Computing
- Secure Software Development Methodologies
- Security Protocols
- Security and Privacy in Mobile Systems
- Security and Privacy in Complex Systems
- Security and Privacy in IT Outsourcing
- Security and Privacy in Location-based Services
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in Social Networks
- Security and Privacy in Web Services
- Security and Privacy Policies
- Security Area Control
- Security Deployment
- Security Engineering
- Security for Grid Computing
- Security in Distributed Systems
- Security Information Systems Architecture and Design and Security
- Security Management
- Security Metrics and Measurement
- Security Requirements (Threats, Vulnerabilities, Risk, Formal
   Methods, etc.)
- Security Verification and Validation
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and QoS Network Security
- Software Security
- Trust Management and Reputation Systems
- Ubiquitous Computing Security
- Wireless Network Security (WiFi, WiMAX, WiMedia and others)

This call for posters and additional information about the conference  
can be found at http://secrypt.icete.org

For any questions, please contact the program chairs:
secrypt2012 at unimi.it

More information about the Om-announce mailing list