SECRYPT 2011 - International Conference on Security and Cryptography (SECRYPT)
Date2011-07-18
Deadline2011-02-03
VenueSeville, Spain
KeywordsSecurity; Cryptography; secrypt; insticc
Topics/Call fo Papers
Conference name: International Conference on Security and Cryptography (SECRYPT)
Venue: Seville - Spain
Event Date: 18-21 July, 2011
The purpose of SECRYPT 2011, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication.
CONFERENCE AREAS
* ? Data and Application Security and Privacy
* ? Access Control and Intrusion Detection
* ? Network Security and Protocols
* ? Cryptographic Techniques and Key Management
* ? Information Assurance
* ? Security in Information Systems and Software Engineering
Area 1: Data and Application Security and Privacy
* ? Data protection
* ? Database security
* ? Identity management
* ? Privacy
* ? Secure cloud computing
* ? Security and privacy in IT outsourcing
* ? Security and privacy in location-based services
* ? Security and privacy in pervasive/ubiquitous computing
* ? Security and privacy in social networks
* ? Security and privacy policies
* ? Security management
* ? Trust and reputation systems
* ? Trust management
Area 2: Access Control and Intrusion Detection
* ? Intrusion Detection and Vulnerability Assessment
* ? Identification, Authentication and Non-repudiation
* ? Insider Threats and Countermeasures
* ? Intrusion Detection & Prevention
* ? Biometric Security
* ? Regulation and Trust Mechanisms
* ? Data Integrity
* ? Models for Authentication, Trust and Authorization
* ? Access Control in Computing Environments
* ? Data Access & Synchronization
* ? Security in Distributed Systems
Area 3: Network Security and Protocols
* ? IPsec, VPNs and Encryption Modes
* ? Service and Systems Design and QoS Network Security
* ? Reliability and Dependability
* ? Web Performance and Reliability
* ? Denial of Service and Other Attacks
* ? Data and Systems Security
* ? Mobile System Security
* ? Ubiquitous Computing Security
* ? Sensor and Mobile Ad Hoc Network Security
* ? Wireless Network Security (WiFi, WiMAX, WiMedia and Others)
* ? Peer-to-Peer Security
* ? Phishing, adfraud, malware, and countermeasures
* ? Active Defense Systems
Area 4: Cryptographic Techniques and Key Management
* ? Smart Card Security
* ? Public Key Crypto Applications
* ? Coding Theory and Practice
* ? Speech/Image Coding
* ? Shannon Theory
* ? Mobile Code & Agent Security
* ? Digital Rights Management
* ? Digital Forensics
Area 5: Information Assurance
* ? Planning Security
* ? Risk Assessment
* ? Security Area Control
* ? Organizational Security Policies and Responsability
* ? Security Through Collaboration
* ? Human Factors and Human Behaviour Recognition Techniques
* ? Ethical and Legal Implications
* ? Information Hiding
* ? Information Systems Auditing
* ? Management of Computing Security
* ? Intellectual Property Protection
Area 6: Security in Information Systems and Software Engineering
* ? Secure Software Development Methodologies
* ? Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
* ? Security Information Systems Architecture and Design and Security Patterns
* ? Security Implementation
* ? Security Verification and Validation
* ? Security Deployment
* ? Security for Grid Computing and Web Services
* ? Security Engineering
* ? Security Metrics and Measurement
* ? Personal Data Protection for Information Systems
IMPORTANT DATES
Conference date: 18-21 July, 2011
Regular Paper Submission: February 3, 2011
Authors Notification (regular papers): April 16, 2011
Final Regular Paper Submission and Registration: May 5, 2011
Contacts:
SECRYPT Secretariat
Address: Av. D. Manuel I, 27A, 2º esq.
2910-595 Setúbal - Portugal
Tel.: +351 265 520 185
Fax: +44 203 014 5432
Event Site: http://www.secrypt.icete.org/
Event E-mail:secrypt.secretariat-AT-insticc.org
Venue: Seville - Spain
Event Date: 18-21 July, 2011
The purpose of SECRYPT 2011, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication.
CONFERENCE AREAS
* ? Data and Application Security and Privacy
* ? Access Control and Intrusion Detection
* ? Network Security and Protocols
* ? Cryptographic Techniques and Key Management
* ? Information Assurance
* ? Security in Information Systems and Software Engineering
Area 1: Data and Application Security and Privacy
* ? Data protection
* ? Database security
* ? Identity management
* ? Privacy
* ? Secure cloud computing
* ? Security and privacy in IT outsourcing
* ? Security and privacy in location-based services
* ? Security and privacy in pervasive/ubiquitous computing
* ? Security and privacy in social networks
* ? Security and privacy policies
* ? Security management
* ? Trust and reputation systems
* ? Trust management
Area 2: Access Control and Intrusion Detection
* ? Intrusion Detection and Vulnerability Assessment
* ? Identification, Authentication and Non-repudiation
* ? Insider Threats and Countermeasures
* ? Intrusion Detection & Prevention
* ? Biometric Security
* ? Regulation and Trust Mechanisms
* ? Data Integrity
* ? Models for Authentication, Trust and Authorization
* ? Access Control in Computing Environments
* ? Data Access & Synchronization
* ? Security in Distributed Systems
Area 3: Network Security and Protocols
* ? IPsec, VPNs and Encryption Modes
* ? Service and Systems Design and QoS Network Security
* ? Reliability and Dependability
* ? Web Performance and Reliability
* ? Denial of Service and Other Attacks
* ? Data and Systems Security
* ? Mobile System Security
* ? Ubiquitous Computing Security
* ? Sensor and Mobile Ad Hoc Network Security
* ? Wireless Network Security (WiFi, WiMAX, WiMedia and Others)
* ? Peer-to-Peer Security
* ? Phishing, adfraud, malware, and countermeasures
* ? Active Defense Systems
Area 4: Cryptographic Techniques and Key Management
* ? Smart Card Security
* ? Public Key Crypto Applications
* ? Coding Theory and Practice
* ? Speech/Image Coding
* ? Shannon Theory
* ? Mobile Code & Agent Security
* ? Digital Rights Management
* ? Digital Forensics
Area 5: Information Assurance
* ? Planning Security
* ? Risk Assessment
* ? Security Area Control
* ? Organizational Security Policies and Responsability
* ? Security Through Collaboration
* ? Human Factors and Human Behaviour Recognition Techniques
* ? Ethical and Legal Implications
* ? Information Hiding
* ? Information Systems Auditing
* ? Management of Computing Security
* ? Intellectual Property Protection
Area 6: Security in Information Systems and Software Engineering
* ? Secure Software Development Methodologies
* ? Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
* ? Security Information Systems Architecture and Design and Security Patterns
* ? Security Implementation
* ? Security Verification and Validation
* ? Security Deployment
* ? Security for Grid Computing and Web Services
* ? Security Engineering
* ? Security Metrics and Measurement
* ? Personal Data Protection for Information Systems
IMPORTANT DATES
Conference date: 18-21 July, 2011
Regular Paper Submission: February 3, 2011
Authors Notification (regular papers): April 16, 2011
Final Regular Paper Submission and Registration: May 5, 2011
Contacts:
SECRYPT Secretariat
Address: Av. D. Manuel I, 27A, 2º esq.
2910-595 Setúbal - Portugal
Tel.: +351 265 520 185
Fax: +44 203 014 5432
Event Site: http://www.secrypt.icete.org/
Event E-mail:secrypt.secretariat-AT-insticc.org
Other CFPs
- International Conference on Signal Processing and Multimedia Applications(SIGMAP)
- International Conference on Wireless Information Networks and Systems (WINSYS)
- 6th International Conference on Software and Data Technologies(ICSOFT)
- International Conference on Computer Graphics Theory and Applications (GRAPP)
- International Conference on Imaging Theory and Applications (IMAGAPP)
Last modified: 2010-08-31 19:18:36