CALL FOR PAPERS

International Conference on Security and Cryptography - SECRYPT 2012

Website: http://www.secrypt.icete.org/
July 24 - 27, 2012
Rome, Italy

In cooperation with IEICE (The Institute of Electronics, Information and Communication Engineers)
and SWIM (Special Interest Group on Software Interprise Modeling)

Sponsored by INSTICC
INSTICC is member of WfMC (Workflow Management Coalition)


Important Deadlines: 
Regular Paper submission: March 5, 2012
Authors Notification (regular papers): April 24, 2012
Final Regular Paper Submission and Registration: May 7, 2012

###############################################################


We would like to draw your attention to the International Conference
on Security and Cryptography (SECRYPT-2012), which has currently an
open call for papers.


Theoretical and practical advances in the fields of cryptography and
coding are a key factor in the growth of data communications, data
networks and distributed computing. In addition to the mathematical
theory and practice of cryptography and coding, SECRYPT also focuses
on other aspects of information systems and network security,
including applications in the scope of the knowledge society in
general and information systems development in particular, especially
in the context of e-business, internet and global enterprises.

SECRYPT 2012 is part of the International Joint Conference on
e-Business and Telecommunications (ICETE 2012) that has 5 more
conferences with very strong synergies between them, namely:

- DCNET: Int'l Conference on Data Communication Networking (http://www.dcnet.icete.org)
- ICE-B: Int'l Conference on e-Business (http://www.ice-b.icete.org)
- OPTICS: Int'l Conference on Optical Communication Systems (http://www.optics.icete.org)
- SIGMAP: Int'l Conference on Signal Processing and Multimedia
  Applications (http://www.sigmap.icete.org)
- WINSYS: Int'l Conference on Wireless Information Networks and
  Systems (http://www.winsys.icete.org)

These six concurrent conferences are held in parallel and registration
to one warrants delegates to attend all six.

ICETE is interested in promoting high quality research as it can be
confirmed by last year acceptance rates, where from 409 submissions,
12% were accepted as full papers, 16% were presented as short papers
and 13% as posters.

The conference program features a number of Keynote Lectures to be
delivered by distinguished world-class researchers, namely:

- Venu Govindaraju, University at Buffalo, United States
  (list not yet complete)
http://www.icete.org/KeynoteSpeakers.aspx
 
Submitted papers will be subject to a double-blind review process. All
accepted papers (full, short and posters) will be published in the
conference proceedings, under an ISBN reference, on paper and on
CD-ROM support. BNHS

A short list of presented papers will be selected so that revised and
extended versions of these papers will be published by Springer-Verlag
in a CCIS Series book.

Additionally, a short list of papers presented at the conference, will
also be selected for publication in the Journal of Information
Processing Systems (JIPS).

Furthermore, a short list of papers presented at the conference, will
be selected for publication in a special issue of JNW - Journal of
Networks

The proceedings will be submitted for indexation by Thomson Reuters
Conference Proceedings Citation Index (ISI), INSPEC, DBLP and Elsevier
Index (EI).  All papers presented at the conference venue will be
available at the SciTePress Digital Library
(http://www.scitepress.org/DigitalLibrary/). SciTePress is member of
CrossRef (http://www.crossref.org/).

Workshops, Special sessions, Tutorials as well as Demonstrations
dedicated to other technical/scientific topics are also envisaged:
companies interested in presenting their products/methodologies or
researchers interested in holding a tutorial are invited to contact
the conference secretariat. Workshop chairs and Special Session chairs
will benefit from logistics support and other types of support,
including secretariat and financial support, to facilitate the
development of a valid idea.


CONFERENCE TOPICS
    * Access Control
    * Applied Cryptography
    * Biometrics Security and Privacy
    * Critical Infrastructure Protection
    * Data Integrity
    * Data Protection
    * Database Security and Privacy
    * Digital Forensics
    * Digital Rights Management
    * Ethical and Legal Implications of Security and Privacy
    * Human Factors and Human Behaviour Recognition Techniques
    * Identification, Authentication and Non-repudiation
    * Identity Management
    * Information Hiding
    * Information Systems Auditing
    * Insider Threats and Countermeasures
    * Intellectual Property Protection
    * Intrusion Detection & Prevention
    * Management of Computing Security
    * Network Security
    * Organizational Security Policies
    * Peer-to-Peer Security
    * Personal Data Protection for Information Systems
    * Privacy
    * Reliability and Dependability
    * Risk Assessment
    * Secure Cloud Computing
    * Secure Software Development Methodologies
    * Security and Privacy in Mobile Systems
    * Security and privacy in Complex Systems
    * Security and Privacy in IT Outsourcing
    * Security and Privacy in Location-based Services
    * Security and Privacy in Pervasive/Ubiquitous Computing
    * Security and Privacy in Social Networks
    * Security and Privacy in Web Services
    * Security and Privacy Policies
    * Security Area Control
    * Security Deployment
    * Security Engineering
    * Security for Grid Computing
    * Security in Distributed Systems
    * Security Information Systems Architecture and Design and Security Patterns
    * Security Management
    * Security Metrics and Measurement
    * Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
    * Security Verification and Validation
    * Sensor and Mobile Ad Hoc Network Security
    * Service and Systems Design and QoS Network Security
    * Software Security
    * Trust management and Reputation Systems
    * Ubiquitous Computing Security
    * Wireless Network Security (WiFi, WiMAX, WiMedia and others)


CONFERENCE CHAIR
Mohammad S. Obaidat, Monmouth University, U.S.A.

PROGRAM CHAIR
Pierangela Samarati, Universita degli Studi di Milano, Italy

PROGRAM CO-CHAIRS
Wenjing Lou, Virginia Polytechnic Institute and State University, United States
Jianying Zhou, Institute For Infocomm Research, Singapore 


Please check further details at the conference web site (http://www.secrypt.icete.org). 

Should you have any question or suggestion please don't hesitate to contact me.


Kind regards,
Monica Saramago
SECRYPT Secretariat

Av. D. Manuel I, 27A 2.esq.
2910-595 Setubal, Portugal
Tel.: +351 265 520 185
Fax: +44 203 014 5432
Email: secrypt.secretariat@insticc.org
Web: http://www.secrypt.icete.org