[Om-announce] SECRYPT 2014 - Call for Position Papers

SECRYPT 2014 secrypt2014 at unimi.it
Thu May 15 19:14:06 CEST 2014


[Apologies if you receive multiple copies of this message]

CALL FOR POSITION PAPERS

************************************************************************
11th International Conference on Security and Cryptography (SECRYPT 2014)
Vienna, Austria, August 28-30, 2014
http://secrypt.icete.org


Co-organized by: Austrian Computer Society
Sponsored by: INSTICC

In Cooperation with: ACM SIGDOC, IACR
Technically sponsored by: SBA (SBA Research)
INSTICC is Member of: WfMC, OMG and FIPA

************************************************************************

SECRYPT is an annual international conference covering research in 
information and communication security.  The 11th International 
Conference on Security and Cryptography (SECRYPT 2014) will be held in 
Vienna, Austria on 28-30 August 2014. The conference seeks submissions 
from academia, industry, and government presenting novel research on 
all theoretical and practical aspects of data protection, privacy, 
security, and cryptography. Papers describing the application of security 
technology, the implementation of systems, and lessons learned are 
also encouraged. The conference topics include, but are not limited to:

Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security


PAPER SUBMISSIONS
Submitted papers must be in English and must not substantially overlap 
with papers that have been published or that are simultaneously submitted 
to a journal or a conference with proceedings. Submissions are to be 
made to the submission web site at http://www.insticc.org/Primoris/.

- POSITION Paper: A position paper presents results that are preliminary 
or that simply require fewer pages to describe. A position paper may be 
a short report and discussion of ideas, facts, situations, methods, 
procedures or results of scientific research (theoretical or experimental) 
on one of the conference topics. 

Submitted papers must be formatted according to the SECRYPT format, 
which is described at http://secrypt.icete.org/GuidelinesTemplates.aspx.  

Submission page limit is 12 pages for regular papers and 8 pages for 
position papers. Accepted papers will be subject to the limit of: 12 pages 
for full papers, 8 pages for short papers with oral presentation, and 6 
pages for short papers with poster presentation. Authors of accepted papers 
must guarantee that their papers will be presented at the conference. All 
papers presented at the conference will be published in the conference 
proceedings and in the digital library. A short list of presented papers 
will be selected so that revised and extended versions of these papers 
will be published by Springer-Verlag in a CCIS Series book.  

We would like to highlight the presence of the following keynote speakers:
- Seymour Goodman, Georgia Institute of Technology, United States
- Ivona Brandic, Vienna UT, Austria
- Dimitris Karagiannis, University of Vienna, Austria
- Matteo Golfarelli, University of Bologna, Italy
- Edgar Weippl, SBA Research / TU Wien, Austria


IMPORTANT DATES

Second call for Position Papers only:
- Paper Submission: May 23, 2014
- Authors Notification: June 27, 2014
- Camera Ready and Registration: July 7, 2014


PROGRAM CHAIR
Pierangela Samarati, Universita' degli Studi di Milano, Italy 


PROGRAM COMMITTEE

Ehab Al-Shaer, University of North Carolina Charlotte, United States
Alessandro Armando, FBK, Italy
Prithvi Bisht, University of Illinois at Chicago, United States
Carlo Blundo, Università di Salerno, Italy
Andrey Bogdanov, Technical University of Denmark, Denmark
Frederic  Cuppens, TELECOM Bretagne, France
Nora Cuppens-Boulahia, TELECOM, France
Sabrina  de Capitani di Vimercati, Università degli Studi di Milano, Italy
Roberto Di Pietro, Universita' di Roma Tre, Italy
Tassos Dimitriou, Computer Technology Institute, Greece and Kuwait University, Kuwait
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain
William Fitzgerald, EMC Information Systems International, Ireland
Sara Foresti, Universita' degli Studi di Milano, Italy
Steven Furnell, Plymouth University, United Kingdom
Joaquin Garcia-Alfaro, Institut Mines-Telecom, TELECOM SudParis, France
Mark Gondree, Naval Postgraduate School, United States
Stefanos Gritzalis, University of the Aegean , Greece
Dimitris Gritzalis, AUEB, Greece
Yong Guan, Iowa State University, United States
Sokratis Katsikas, University of Piraeus, Greece
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan
Ruggero Donida Labati, Università degli Studi di Milano, Italy
Costas Lambrinoudakis, University of Piraeus, Greece
Bo Lang, Beijing University of Aeronautics and Astronautics, China
Patrick P. C. Lee , Chinese University of Hong Kong, Hong Kong
Adam J. Lee , University of Pittsburgh, United States
Albert Levi, Sabanci University, Turkey
Jiguo Li, Hohai University, China
Ming Li, Utah State University, United States
Giovanni Livraga, Universita degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain
Haibing Lu, Santa Clara University, United States
Emil Lupu, Imperial College, United Kingdom
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Vashek Matyas, Masaryk University, Czech Republic
Carlos Maziero, UTFPR - Federal University of Technology - Paraná state, Brazil
Wojciech Mazurczyk, Warsaw University of Technology, Poland
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
David Naccache, Ecole Normale Superieure, France
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, University of Bergamo, Italy
Joon Park, Syracuse University, United States
Günther Pernul, University of Regensburg, Germany
Joachim Posegga, Institute of IT Security and Security Law, Germany
Silvio Ranise, Fondazione Bruno Kessler, Italy
Kui Ren, state university of new york at buffalo, United States
Nicolas Sklavos, Technological Educational Institute of Western Greece, Greece
Alessandro Sorniotti , IBM Research, Switzerland
Willy Susilo, University of Wollongong, Australia
Juan Tapiador, Universidad Carlos III de Madrid, Spain
Vicenc Torra, IIIA-CSIC, Spain
Jaideep Vaidya, Rutgers Business School, United States
Luca  Viganò, University of Verona, Italy
Haining  Wang, The College of William and Mary, United States
Cong Wang, City University of Hong Kong, Hong Kong
Lingyu Wang, Concordia University, Canada
Ping Wang, Symantec Corporation, United States
Xinyuan (Frank) Wang, George Mason University , United States
Edgar Weippl, SBA Research / TU Wien, Austria
Alec Yasinsac, University of South Alabama, United States
Meng Yu, Virginia Commonwealth University, United States
Lei Zhang, Thomson Reuters, United States


This call for papers and additional information about the conference
can be found at http://secrypt.icete.org/
****************
Il 5 x mille alla nostra Università è un investimento sui giovani,
sui loro migliori progetti.

Sostiene la libera ricerca.
Alimenta le loro speranze nel futuro.

Investi il tuo 5 x mille sui giovani.

Università degli Studi di Milano
codice fiscale 80012650158

http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille



More information about the Om-announce mailing list