Call for Papers Security and Protection of Information (SPI) http://spi.unob.cz/vyzvaen.asp Brno, Exhibition centre, Czech Republic SPI is an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies and their applications. Objectives of the conference are: * Extending the tradition of exchanging knowledge and experiences of IT security between participants from the Czech Republic and abroad, from military, industry and academia, as established by the 2001, 2003, 2005, 2007 and 2009 SPI conferences. * Meet leadings world and Czech experts in the ICT security area. * Provide a wide forum for exchange of information. The open forum of the conference is an excellent opportunity to establish contacts with colleagues from different regions. The social program is therefore an important part of the conference. Speakers desiring to submit papers should e-mail an abstract of at least 250 words along with a short CV/résumé of the speaker(s) to Jaroslav Dočkal (email@example.com) by January 20th, 2011. Please enter "SPI 2011" in the e-mail subject field. All abstracts should include the speaker's name and title. Abstracts mupst be in English, please prefer format. Kindly ensure that the abstract portrays the author's intent clearly and that it is an accurate reflection of the final paper. Also include the author's affiliation, address, phone/fax numbers and e-mail. You will receive a response to your submission by February 15th, 2011. After notification of the paper's acceptance, authors will receive detailed instructions about the formal preparation of the manuscript. The deadline for camera-ready copies is March 20th, 2011. Please use the e-mail address firstname.lastname@example.org for all correspondence. A maximum of 10 pages will be accepted. The time allotted for one speech is 15 minutes max. The conference program will be distributed by April 10th, 2011. Proceedings will have an ISBN. Areas of interest include, but are not limited to: New Approaches to Security and Protection of Information: * security policy in government administration * development and application standards in security * vulnerabilities, risk management, incident response, patch management * mobile management and security convergence * forensic discovery of computers and computer networks * security economics * cloud computing security * business continuity planning, disaster recovery * identity, access and authorization management * data loss prevention * application of electronic signature and PKI * biometrics * personnel security and protection programs * security solution for virtualization Computer Network Security: * security threats, hacker activities, incident handling * TCP/IP protocol suite security, secure routing * VoIP, IT telephony and WiFi security * secure directories, e-mail, DNS, and web security * firewalls, VPNs, intruder detection and prevention systems * secure programming * anti-virus protection Applied Cryptography: * cryptographic applications * cryptoanalysis * cryptographic algorithms, their design and implementation * modularity and re-use of critical components * cryptographic standards * cryptography and legislation * privacy enhancing technologies * provable security * RFID - security and cryptography aspects, etc. Information Security in Military Environments: * multilevel system security * security policy, procedures and regulation * securing operating and database systems * technological questions of computer security * PKI in military environments * secure multicast conferencing * security problem scenarios, security education and training Important Dates Submission Due: January 20, 2011 Acceptance Notification: February 15, 2011 Camera-ready Copy Due: March 20, 2011 Conference: May 10 - May 12, 2011 Program Committee * Jaroslav Dočkal, University of Defence, Czech Republic (Committee Chair); * Daniel Cvrček, Brno University of Technology, Czech Republic; * Steven M. Furnell, University of Plymouth, Great Britain * Josef Kaderka, University of Defence, Czech Republic; * Herbert Leitold, Secure Information Technology Center, Austria; * Jan Loeschner, Joint Research Centre — European Commission, Italy; * Václav Matyáš, Masaryk University Brno, Czech Republic; * Daniel Olejár, Comenius University, Slovak Republic; * Garant Price, Royal Holloway, Great Britain; * Zdeněk Říha, Masaryk University Brno, Czech Republic; * Dimitrios N. Serpanos, University of Patras, Greece. Organizing Institucions * University of Defence, Kounicova 65, 662 10 Brno, Czech Republic; * Department of Security, Ministry of Defence, Czech Republic; * Trade Fairs Brno, Výstaviště 1, 647 00 Brno, Czech Republic; * CNSE. Realization Team * Conference manager: Jaroslav Dočkal, University of Defence, Brno, e-mail: email@example.com, tel.: +420 973 443 544, mobile phone: +420 737 215 217. * Members of the organizing committee: Josef Kaderka, Ph.D., University of Defence, Brno, tel.: +420 973 442 704; Ladislav Hagara, University of Defence, Brno, tel.: +420 973 442 781; Milan Jirsa, University of Defence, Brno, tel.: +420 973 444 839.