13th International Conference on Security and Cryptography (SECRYPT 2016)
Lisbon, Portugal, 26-28 July 2016

SECRYPT is an annual international conference covering research in
information and communication security.  The 13th International
Conference on Security and Cryptography (SECRYPT 2016) will be held in
Lisbon, Portugal, 26-28 July 2016.

The conference seeks submissions from academia,L industry, and
government presenting novel research on all theoretical and practical
aspects of data protection, privacy, security, and cryptography.

Papers describing the application of security technology, the
implementation of systems, and lessons learned are also encouraged.

The conference topics include, but are not limited to:

Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Ethical and Legal Implications of Security and Privacy
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Hiding
Information Systems Auditing
Insider Threats and Countermeasures
Intellectual Property Protection
Intrusion Detection & Prevention
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy Enhancing Technologies
Reliability and Dependability
Risk Assessment
Secure Software Development Methodologies
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security

Submitted papers must be in English and must not substantially overlap
with papers that have been published or that are simultaneously
submitted to a journal or a conference with proceedings.  Submissions
are to be made to the submission web site at

Papers can be submitted as REGULAR or POSITION papers.

- REGULAR Paper: Regular papers present work where research is
completed.  They can be up to 12 pages.  Authors of regular submitted
papers will indicate at the time of submission whether they would like
their paper to also be considered for publication as a position paper.

- POSITION Paper: A position paper presents results that are
preliminary or that simply require fewer pages to describe. A position
paper may be a short report and discussion of ideas, facts,
situations, methods, procedures or results of scientific research
(theoretical or experimental) on one of the conference topics.  The
acceptance of a position paper is restricted to the categories of
"short paper"

Submitted papers must be formatted according to the SECRYPT format,
which is described at

Submission page limit is 12 pages for regular paper and 8 pages for
position papers.  Accepted papers will be subject to the limit of: 12
pages for full papers, 8 pages for short papers with oral
presentation, and 6 pages for short papers with poster presentation.
Authors of accepted papers must guarantee that their papers will be
presented at the conference. All papers presented in the conference
will be published in the conference proceedings and in the digital
library.  A short list of presented papers will be selected so that
revised and extended versions of these papers will be published by
Springer-Verlag in a CCIS Series book.

Regular and Position Papers
- Paper Submission: March 1, 2016
- Authors Notification: May 18, 2016
- Camera Ready and Registration: June 2, 2016

Second call for Position Papers only:
- Paper Submission: April 13, 2016
- Authors Notification: May 18, 2016
- Camera Ready and Registration: June 2, 2016

Pierangela Samarati, Universita' degli Studi di Milano, Italy 

PROGRAM COMMITTEE (to be completed)

Luis Antunes, Instituto de telecomunicacoes Porto, Portugal 
Prithvi Bisht, Adobe, United States 
Carlo Blundo, Universita’ di Salerno, Italy 
Andrey Bogdanov, Technical University of Denmark, Denmark 
Francesco Buccafurri, University of Reggio Calabria, Italy 
Sherman S. M. Chow, Chinese University of Hong Kong, Hong Kong 
Frederic Cuppens, TELECOM Bretagne, France 
Nora Cuppens-Boulahia, Institut Mines Telecom / Telecom Bretagne, France 
Jun Dai, California State University, United States 
Sabrina de Capitani di Vimercati, Universita’ degli Studi di Milano, Italy 
Roberto Di Pietro, Universita' di Roma Tre, Italy 
Tassos Dimitriou, Kuwait University, Kwait and CTI, Greece
Ruggero Donida Labati, Universita’ degli Studi di Milano, Italy 
Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain 
Alberto Ferrante, Universita’ della Svizzera Italiana, Switzerland 
Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain 
William M. Fitzgerald, United Technologies Research Center Ireland
  (UTRCI), Ireland
Sara Foresti, Universita' degli Studi di Milano, Italy 
Steven Furnell, Plymouth University, United Kingdom 
Joaquin Garcia-Alfaro, Institut Mines-Telecom, TELECOM SudParis, France 
Mark Gondree, Naval Postgraduate School, United States 
Dimitris Gritzalis, AUEB, Greece 
Sotiris Ioannidis, Foundation for Research and Technology - Hellas, Greece 
Wael Kanoun, ALCATEL-LUCENT, France 
Florian Kerschbaum, SAP, Germany 
Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan 
Costas Lambrinoudakis, University of Piraeus, Greece 
Albert Levi, Sabanci University, Turkey 
Jiguo Li, Hohai University, China 
Giovanni Livraga, Universita’ degli Studi di Milano, Italy 
Javier Lopez, University of Malaga, Spain 
Haibing Lu, Santa Clara University, United States 
Olivier Markowitch, Universite’ Libre de Bruxelles, Belgium 
Fabio Martinelli, IIT-CNR, Italy 
Vashek Matyas, Masaryk University, Czech Republic 
Eiji Okamoto, University of Tsukuba, Japan 
Rolf Oppliger, eSECURITY Technologies, Switzerland 
Stefano Paraboschi, University of Bergamo, Italy 
Joon Park, Syracuse University, United States 
Gerardo Pelosi, Politecnico di Milano, Italy 
Gunther Pernul, University of Regensburg, Germany 
Nuno Santos, INESC, Portugal 
Andreas Schaad, Huawei European Research Center, Germany 
Cristina Serban, AT&T, United States 
Daniele Sgandurra, Imperial College, London, United Kingdom 
Juan Tapiador, Universidad Carlos III de Madrid, Spain 
Vicenc Torra, University of Skovde, Sweden 
Jaideep Vaidya, Rutgers Business School, United States 
Luca Vigano’, University of Verona, Italy 
Haining Wang, The College of William and Mary, United States 
Cong Wang, City University of Hong Kong, Hong Kong 
Lingyu Wang, Concordia University, Canada 
Edgar Weippl, SBA Research, Austria 
Meng Yu, Virginia Commonwealth University, United States 
Lei Zhang, Thomson Reuters, United States 

For any questions, please contact the program chair: