Venue:
Vienna, Austria
Event date:
2 - 4 September 2014
Regular Papers
Regular Paper Submission: April 15, 2014
Regular Paper Authors Notification: June
16, 2014
Regular Paper Camera Ready and Registration: June 30, 2014
Scope:
The purpose of SECRYPT 2014, the
International Conference on Security and Cryptography, is to bring together
researchers, mathematicians, engineers and practitioners interested on security
aspects related to information and communication.
Theoretical and practical advances in the fields of cryptography and coding are
a key factor in the growth of data communications, data networks and
distributed computing. In addition to the mathematical theory and practice of
cryptography and coding, SECRYPT also focuses on other aspects of information
systems and network security, including applications in the scope of the
knowledge society in general and information systems development in particular,
especially in the context of e-business, internet and global enterprises.
Information theory and information security are hot topics nowadays, ranging
from statistics and stochastic processes to coding, from detection and
estimation to Shannon theory, from data compression to data networks and
systems security, cryptography, as well as many other topics.
Conference Topics
- Identity Management
- Security Area Control
- Sensor and Mobile Ad Hoc Network Security
- Risk Assessment
- Information Hiding
- Intrusion Detection & Prevention
- Peer-to-Peer Security
- Data Integrity
- Reliability and Dependability
- Digital Rights Management
- Secure Software Development Methodologies
- Management of Computing Security
- Service and Systems Design and QoS Network Security
- Security requirements
- Ubiquitous Computing Security
- Information Systems Auditing
- Insider Threats and Countermeasures
- Security Engineering
- Security Verification and Validation
- Security Deployment
- Security Metrics and Measurement
- Personal Data Protection for Information Systems
- Identification, Authentication and Non-repudiation
- Security in Distributed Systems
- Digital Forensics
- Intellectual Property Protection
- Data Protection
- Privacy
- Security and Privacy in IT Outsourcing
- Security and Privacy in Location-based Services
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in Social Networks
- Security and Privacy Policies
- Security Management
- Access Control
- Applied Cryptography
- Biometrics Security and Privacy
- Critical Infrastructure Protection
- Database Security and Privacy
- Ethical and Legal Implications of Security and Privacy
- Network Security
- Organizational Security Policies
- Security and privacy in Complex Systems
- Security and Privacy in Mobile Systems
- Security and Privacy in Web Services
- Software Security
- Trust management and Reputation Systems
- Formal Methods for Security
- Privacy Enhancing Technologies
- Security Protocols
- Human Factors and Human Behavior Recognition Techniques
- Security and Privacy in Crowdsourcing
- Security and Privacy in Smart Grids
- Security and Privacy in the Cloud
- Security Information Systems Architecture
- Wireless Network Security
ICETE Keynote Speakers
ICETE 2014 will have several invited keynote speakers, who are internationally recognized experts in their areas. Their names are not yet confirmed.
ICETE Conference Co-chairs
Mohammad S. Obaidat, Monmouth
University, United States
Andreas Holzinger, Medical University Graz, Austria
Program Chair:
Pierangela Samarati, Università degli Studi di Milano, Italy
PROGRAM COMMITTEE
http://www.secrypt.icete.org/ProgramCommittee.aspx
SECRYPT Secretariat
Address: Av. D. Manuel I, 27A, 2º esq.
2910-595 Setúbal - Portugal
Tel.:
+351 265 520 185
Fax: +44 203 014 8813
e-mail: secrypt.secretariat@insticc.org
Web: http://www.secrypt.icete.org