Call for Papers
Security and Protection of Information (SPI)
http://spi.unob.cz/vyzvaen.asp
Brno, Exhibition centre, Czech Republic

SPI is an annual conference that brings together researchers and
practitioners to provide a confluence of new information security
technologies and their applications.

Objectives of the conference are:

    * Extending the tradition of exchanging knowledge and experiences
      of IT security between participants from the Czech Republic and
      abroad, from military, industry and academia, as established by
      the 2001, 2003, 2005, 2007 and 2009 SPI conferences.
    * Meet leadings world and Czech experts in the ICT security area.
    * Provide a wide forum for exchange of information. The open forum
      of the conference is an excellent opportunity to establish
      contacts with colleagues from different regions. The social
      program is therefore an important part of the conference.

Speakers desiring to submit papers should e-mail an abstract of at
least 250 words along with a short CV/résumé of the
speaker(s) to Jaroslav Dočkal (jdockal.spi@gmail.com) by January 20th,
2011. Please enter "SPI 2011" in the e-mail subject field. All
abstracts should include the speaker's name and title. Abstracts mupst
be in English, please prefer format. Kindly ensure that the abstract
portrays the author's intent clearly and that it is an accurate
reflection of the final paper. Also include the author's affiliation,
address, phone/fax numbers and e-mail. You will receive a response to
your submission by February 15th, 2011.

After notification of the paper's acceptance, authors will receive
detailed instructions about the formal preparation of the
manuscript. The deadline for camera-ready copies is March 20th,
2011. Please use the e-mail address jdockal.spi@gmail.com for all
correspondence. A maximum of 10 pages will be accepted. The time
allotted for one speech is 15 minutes max. The conference program will
be distributed by April 10th, 2011. Proceedings will have an ISBN.

Areas of interest include, but are not limited to:

New Approaches to Security and Protection of Information:

    * security policy in government administration
    * development and application standards in security
    * vulnerabilities, risk management, incident response, patch management
    * mobile management and security convergence
    * forensic discovery of computers and computer networks
    * security economics
    * cloud computing security
    * business continuity planning, disaster recovery
    * identity, access and authorization management
    * data loss prevention
    * application of electronic signature and PKI
    * biometrics
    * personnel security and protection programs
    * security solution for virtualization

Computer Network Security:

    * security threats, hacker activities, incident handling
    * TCP/IP protocol suite security, secure routing
    * VoIP, IT telephony and WiFi security
    * secure directories, e-mail, DNS, and web security
    * firewalls, VPNs, intruder detection and prevention systems
    * secure programming
    * anti-virus protection

Applied Cryptography:

    * cryptographic applications
    * cryptoanalysis
    * cryptographic algorithms, their design and implementation
    * modularity and re-use of critical components
    * cryptographic standards
    * cryptography and legislation
    * privacy enhancing technologies
    * provable security
    * RFID - security and cryptography aspects, etc.

Information Security in Military Environments:

    * multilevel system security
    * security policy, procedures and regulation
    * securing operating and database systems
    * technological questions of computer security
    * PKI in military environments
    * secure multicast conferencing
    * security problem scenarios, security education and training

Important Dates
Submission Due: 	January 20, 2011
Acceptance Notification: 	February 15, 2011
Camera-ready Copy Due: 	March 20, 2011
Conference: 	May 10 - May 12, 2011

Program Committee

    * Jaroslav Dočkal, University of Defence, Czech Republic (Committee Chair);
    * Daniel Cvrček, Brno University of Technology, Czech Republic;
    * Steven M. Furnell, University of Plymouth, Great Britain
    * Josef Kaderka, University of Defence, Czech Republic;
    * Herbert Leitold, Secure Information Technology Center, Austria;
    * Jan Loeschner, Joint Research Centre — European Commission, Italy;
    * Václav Matyáš, Masaryk University Brno, Czech Republic;
    * Daniel Olejár, Comenius University, Slovak Republic;
    * Garant Price, Royal Holloway, Great Britain;
    * Zdeněk Říha, Masaryk University Brno, Czech Republic;
    * Dimitrios N. Serpanos, University of Patras, Greece.

Organizing Institucions

    * University of Defence, Kounicova 65, 662 10 Brno, Czech Republic;
    * Department of Security, Ministry of Defence, Czech Republic;
    * Trade Fairs Brno, Výstaviště 1, 647 00 Brno, Czech Republic;
    * CNSE.

Realization Team

    * Conference manager: Jaroslav Dočkal, University of Defence, Brno,
      e-mail: jdockal.spi@gmail.com,
      tel.: +420 973 443 544,
      mobile phone: +420 737 215 217.
    * Members of the organizing committee:
      Josef Kaderka, Ph.D., University of Defence, Brno, tel.: +420 973 442 704;
      Ladislav Hagara, University of Defence, Brno, tel.: +420 973 442 781;
      Milan Jirsa, University of Defence, Brno, tel.: +420 973 444 839.