OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.


Help: OASIS Mailing Lists Help | MarkMail Help

announce message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]

Subject: CFP SECRYPT 2013 - 10th International Conference on Security and Cryptography



10th International Conference on Security and Cryptography - SECRYPT 2013


Website: http://www.secrypt.icete.org


July  29 - 31, 2013

Reykjavík, Iceland



Important Deadlines:


Regular Papers


Paper Submission: February 22, 2013

Authors Notification: May 6, 2013

Final Paper Submission and Registration: May 20, 2013



Sponsored by:


INSTICC - Institute for Systems and Technologies of Information, Control and Communication



Co-organized by:


Reykjavik University



INSTICC is Member of:


WFMC- Workflow Management



The purpose of SECRYPT 2013, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication. Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.

Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics that can be listed, as indicated below.


Ideas on how to analyze and approach security problems by combining information and communication technologies with the appropriate theoretical work including information theory and communication theory, either in the scope of R&D projects, engineering or business applications, are welcome. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of SECRYPT, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and poster sessions.

The best papers will be selected to appear in a book to be published by Springer-Verlag.


Special sessions, case studies and tutorials dedicated to technical/scientific topics related to the main conference are also envisaged: researchers interested in organizing a special session, or companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat.





ICETE 2013 will have several invited keynote speakers, who are internationally recognized experts in their areas. Their names are not yet confirmed.




All accepted papers (full, short and posters) will be published in the conference proceedings, under an ISBN reference, on paper and on CD-ROM support.

All papers presented at the conference venue will be available at the SciTePress Digital Library (http://www.scitepress.org/DigitalLibrary/).

SciTePress is member of CrossRef (http://www.crossref.org/).

A short list of presented papers will be selected so that revised and extended versions of these papers will be published by Springer-Verlag in a CCIS Series book

The proceedings will be submitted for indexation by Thomson Reuters Conference Proceedings Citation Index (ISI), INSPEC, DBLP and EI (Elsevier Index).




Best paper awards will be distributed during the conference closing session.

Please check the website for further information (http://www.secrypt.icete.org/BestPaperAward.aspx).


ICETE Conference Chair


Mohammad S. Obaidat, Monmouth University, United States


Program Chair

Pierangela Samarati, Universita' degli Studi di Milano, Italy


Conference Topics



    Access Control

    Applied Cryptography

    Biometrics Security and Privacy

    Critical Infrastructure Protection

    Data Integrity

    Data Protection

    Database Security and Privacy

    Digital Forensics

    Digital Rights Management

    Ethical and Legal Implications of Security and Privacy

    Formal Methods for Security

    Human Factors and Human Behavior Recognition Techniques

    Identification, Authentication and Non-repudiation

    Identity Management

    Information Hiding

    Information Systems Auditing

    Insider Threats and Countermeasures

    Intellectual Property Protection

    Intrusion Detection & Prevention

    Management of Computing Security

    Network Security

    Organizational Security Policies

    Peer-to-Peer Security

    Personal Data Protection for Information Systems


    Privacy Enhancing Technologies

    Reliability and Dependability

    Risk Assessment

    Secure Software Development Methodologies

    Security and privacy in Complex Systems

    Security and Privacy in Crowdsourcing

    Security and Privacy in IT Outsourcing

    Security and Privacy in Location-based Services

    Security and Privacy in Mobile Systems

    Security and Privacy in Pervasive/Ubiquitous Computing

    Security and Privacy in Smart Grids

    Security and Privacy in Social Networks

    Security and Privacy in the Cloud

    Security and Privacy in Web Services

    Security and Privacy Policies

    Security Area Control

    Security Deployment

    Security Engineering

    Security in Distributed Systems

    Security Information Systems Architecture

    Security Management

    Security Metrics and Measurement

    Security Protocols

    Security requirements

    Security Verification and Validation

    Sensor and Mobile Ad Hoc Network Security

    Service and Systems Design and QoS Network Security

    Software Security

    Trust management and Reputation Systems

    Ubiquitous Computing Security

    Wireless Network Security








Please check further details at the conference website (http://www.secrypt.icete.org).

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]