International Conference on Security and Cryptography (SECRYPT 2009) (SECRYPT 2009)

Venue: Milan

Location: Milan, Italy

Event Date/Time: Jul 07, 2009 End Date/Time: Jul 10, 2009
Early Registration Date: Feb 17, 2009
Paper Submission Date: Feb 17, 2009
Report as Spam

Description

Scope

The purpose of SECRYPT 2009, the International Conference on Security and Cryptography, is to bring together researchers, engineers and practitioners interested on information systems and applications in the context of wireless networks and mobile technologies.

Information systems and information technology are pervasive in the whole communications field, which is quite vast, encompassing a large number of research topics and applications: from practical issues to the more abstract theoretical aspects of communication; from low level protocols to high-level networking and applications; from wireless networking technologies to mobile information systems; many other topics are included in the scope of SECRYPT.

Ideas on how to analyze and approach problems by combining information systems and communication technologies, either in the scope of R&D projects, engineering or business applications, are welcome. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of SECRYPT, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and poster sessions.
The best papers will be selected to appear either in an international journal or in a book to be published by Springer.

Special sessions, case-studies and tutorials dedicated to technical/scientific topics related to the main conference are also envisaged: researchers interested in organizing a special session, or companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat.


Conference Areas

Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:

* › Access Control and Intrusion Detection
* › Network Security and Protocols
* › Cryptographic Techniques and Key Management
* › Information Assurance
* › Security in Information Systems

Area 1: Access Control and Intrusion Detection


* › Intrusion Detection and Vulnerability Assessment
* › Authentication and Non-repudiation
* › Identification and Authentication
* › Insider Threats and Countermeasures
* › Intrusion Detection & Prevention
* › Identity and Trust Management
* › Biometric Security
* › Trust models and metrics
* › Regulation and Trust Mechanisms
* › Data Integrity
* › Models for Authentication, Trust and Authorization
* › Access Control in Computing Environments
* › Multiuser Information

Area 2: Network Security and Protocols


* › IPsec, VPNs and Encryption Modes
* › Service and Systems Design and QoS Network Security
* › Fairness Scheduling and QoS Guarantee
* › Reliability and Dependability
* › Web Performance and Reliability
* › Denial of Service and Other Attacks
* › Data and Systems Security
* › Data Access & Synchronization
* › GPRS and CDMA Security
* › Mobile System Security
* › Ubiquitous Computing Security
* › Security in Localization Systems
* › Sensor and Mobile Ad Hoc Network Security
* › Wireless Network Security (WiFi, WiMAX, WiMedia and Others)
* › Security of GSM/GPRS/UMTS Systems
* › Peer-to-Peer Security
* › e-Commerce Protocols and Micropayment Schemes

Area 3: Cryptographic Techniques and Key Management


* › Smart Card Security
* › Public Key Crypto Applications
* › Coding Theory and Practice
* › Spread Spectrum Systems
* › Speech/Image Coding
* › Shannon Theory
* › Stochastic Processes
* › Quantum Information Processing
* › Mobile Code & Agent Security
* › Digital Rights Management

Area 4: Information Assurance


* › Planning Security
* › Risk Assessment
* › Security Area Control
* › Organizational Security Policies and Responsability
* › Security Through Collaboration
* › Human Factors and Human Behaviour Recognition Techniques
* › Ethical and Legal Implications
* › Intrusive, Explicit Security vs. Invisible, Implicit Computing
* › Information Hiding
* › Information Systems Auditing
* › Management of Computing Security

Area 5: Security in Information Systems


* › Security for Grid Computing
* › Secure Software Development Methodologies
* › Security for Web Services
* › Security for Databases and Data Warehouses
* › e-Health
* › Security Engineering
* › Security Information Systems Architectures
* › Security Requirements
* › Security Metrics
* › Personal Data Protection
* › XML Security
* › Workflow and Business Process Security


Important Deadlines


* › Regular Paper Submission: February 17, 2009
* › Author Notification: April 16, 2009
* › Final Paper Submission and Registration: April 30, 2009
* › Conference Date: July 7-10, 2009

Secretariat

SECRYPT Secretariat
Av. D. Manuel I, 27A, 2.º esq., 2910-595 Setúbal, Portugal
Tel.: +351 265 520 185
Fax: +44 203 014 5432
E-mail: secretariat@secrypt.org
Web: http://www.secrypt.org/

Venue

Milan
Milan
Italy
MORE INFO ON THIS VENUE