10th International Conference on Security and Cryptography (SECRYPT 2013) RRS feed

  • Question

  • Conference name: 10th International Conference on Security and Cryptography (SECRYPT 2013)

    Venue: Reykjavík, Iceland

    Event Date: 29-31 July, 2013

    The purpose of SECRYPT 2013, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication. Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.
    Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics that can be listed, as indicated below.

    Conference Topics

        Access Control
        Applied Cryptography
        Biometrics Security and Privacy
        Critical Infrastructure Protection
        Data Integrity
        Data Protection
        Database Security and Privacy
        Digital Forensics
        Digital Rights Management
        Ethical and Legal Implications of Security and Privacy
        Formal Methods for Security
        Human Factors and Human Behavior Recognition Techniques
        Identification, Authentication and Non-repudiation
        Identity Management
        Information Hiding
        Information Systems Auditing
        Insider Threats and Countermeasures
        Intellectual Property Protection
        Intrusion Detection & Prevention
        Management of Computing Security
        Network Security
        Organizational Security Policies
        Peer-to-Peer Security
        Personal Data Protection for Information Systems
        Privacy Enhancing Technologies
        Reliability and Dependability
        Risk Assessment
        Secure Software Development Methodologies
        Security and privacy in Complex Systems
        Security and Privacy in Crowdsourcing
        Security and Privacy in IT Outsourcing
        Security and Privacy in Location-based Services
        Security and Privacy in Mobile Systems
        Security and Privacy in Pervasive/Ubiquitous Computing
        Security and Privacy in Smart Grids
        Security and Privacy in Social Networks
        Security and Privacy in the Cloud
        Security and Privacy in Web Services
        Security and Privacy Policies
        Security Area Control
        Security Deployment
        Security Engineering
        Security in Distributed Systems
        Security Information Systems Architecture
        Security Management
        Security Metrics and Measurement
        Security Protocols
        Security requirements
        Security Verification and Validation
        Sensor and Mobile Ad Hoc Network Security
        Service and Systems Design and QoS Network Security
        Software Security
        Trust management and Reputation Systems
        Ubiquitous Computing Security
        Wireless Network Security


    Conference Date: 29 - 31 July, 2013

    Regular Paper Submission: February 22, 2013
    Authors Notification (regular papers): May 6, 2013
    Final Regular Paper Submission and Registration: May 20, 2013


    SECRYPT Secretariat

    Address: Av. D. Manuel I, 27A, 2º esq., 2910-595 Setubal - Portugal

    Tel.: +351 265 520 185
    Fax: +44 203 014 5432

    e-mail: secrypt.secretariat@insticc.org
    Web: http://www.secrypt.icete.org
    Tuesday, December 4, 2012 3:30 PM