Conferences In Information Security

Conference Name The International Conference on Security and Cryptography
Venue Athens (Greece),
URL http://www.secrypt.icete.org/call_for_papers.asp
Submission Deadline 26-Feb-10
Conference Date 26-28 July, 2010
Sponsership/Publisher Springer-Verlag in a CCIS Series book.
Aim/Scope/Research Area The purpose of SECRYPT 2010, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication. Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.
Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics that can be listed, as indicated below.

Ideas on how to analyze and approach security problems by combining information and communication technologies with the appropriate theoretical work including information theory and communication theory, either in the scope of R&D projects, engineering or business applications, are welcome. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of SECRYPT, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and poster sessions.

The best papers will be selected to appear in a book to be published by Springer-Verlag.

Special sessions, case studies and tutorials dedicated to technical/scientific topics related to the main conference are also envisaged: researchers interested in organizing a special session, or companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat.

Conference Areas
Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:
› Data and Application Security and Privacy
› Access Control and Intrusion Detection
› Network Security and Protocols
› Cryptographic Techniques and Key Management
› Information Assurance
› Security in Information Systems and Software Engineering

Area 1: Data and Application Security and Privacy
› Data protection
› Database security
› Identity management
› Privacy
› Secure cloud computing
› Security and privacy in IT outsourcing
› Security and privacy in location-based services
› Security and privacy in pervasive/ubiquitous computing
› Security and privacy in social networks
› Security and privacy policies
› Security management
› Trust and reputation systems
› Trust management

Area 2: Access Control and Intrusion Detection
› Intrusion Detection and Vulnerability Assessment
› Identification, Authentication and Non-repudiation
› Insider Threats and Countermeasures
› Intrusion Detection & Prevention
› Biometric Security
› Regulation and Trust Mechanisms
› Data Integrity
› Models for Authentication, Trust and Authorization
› Access Control in Computing Environments
› Data Access & Synchronization
› Security in Distributed Systems

Area 3: Network Security and Protocols
› IPsec, VPNs and Encryption Modes
› Service and Systems Design and QoS Network Security
› Reliability and Dependability
› Web Performance and Reliability
› Denial of Service and Other Attacks
› Data and Systems Security
› Mobile System Security
› Ubiquitous Computing Security
› Sensor and Mobile Ad Hoc Network Security
› Wireless Network Security (WiFi, WiMAX, WiMedia and Others)
› Peer-to-Peer Security
› Phishing, adfraud, malware, and countermeasures
› Active Defense Systems

Area 4: Cryptographic Techniques and Key Management
› Smart Card Security
› Public Key Crypto Applications
› Coding Theory and Practice
› Speech/Image Coding
› Shannon Theory
› Mobile Code & Agent Security
› Digital Rights Management
› Digital Forensics

Area 5: Information Assurance
› Planning Security
› Risk Assessment
› Security Area Control
› Organizational Security Policies and Responsability
› Security Through Collaboration
› Human Factors and Human Behaviour Recognition Techniques
› Ethical and Legal Implications
› Information Hiding
› Information Systems Auditing
› Management of Computing Security
› Intellectual Property Protection

Area 6: Security in Information Systems and Software Engineering
› Secure Software Development Methodologies
› Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
› Security Information Systems Architecture and Design and Security Patterns
› Security Implementation
› Security Verification and Validation
› Security Deployment
› Security for Grid Computing and Web Services
› Security Engineering
› Security Metrics and Measurement
› Personal Data Protection for Information Systems

Back To Conferences List

Database Sections