Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    SECRYPT 2009 - SECRYPT 2009, the International Conference on Security and Cryptography

    View: 2835

    Website http://www.secrypt.org/call_for_papers.asp | Want to Edit it Edit Freely

    Category SECRYPT 2009

    Deadline: February 17, 2009 | Date: July 07, 2009

    Venue/Country: Milan, Italy

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    SECRYPT is organized by INSTICC ¨C Institute for Systems and Technologies of Information, Control and Communication

    Scope

    The purpose of SECRYPT 2009, the International Conference on Security and Cryptography, is to bring together researchers, engineers and practitioners interested on information systems and applications in the context of wireless networks and mobile technologies.

    Information systems and information technology are pervasive in the whole communications field, which is quite vast, encompassing a large number of research topics and applications: from practical issues to the more abstract theoretical aspects of communication; from low level protocols to high-level networking and applications; from wireless networking technologies to mobile information systems; many other topics are included in the scope of SECRYPT.

    Ideas on how to analyze and approach problems by combining information systems and communication technologies, either in the scope of R&D projects, engineering or business applications, are welcome. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of SECRYPT, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and poster sessions.

    The best papers will be selected to appear either in an international journal or in a book to be published by Springer.

    Special sessions, case-studies and tutorials dedicated to technical/scientific topics related to the main conference are also envisaged: researchers interested in organizing a special session, or companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat.

    Conference Areas

    Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:

    › Access Control and Intrusion Detection

    › Network Security and Protocols

    › Cryptographic Techniques and Key Management

    › Information Assurance

    › Security in Information Systems and Software Engineering

    Area 1: Access Control and Intrusion Detection

    › Intrusion Detection and Vulnerability Assessment

    › Authentication and Non-repudiation

    › Identification and Authentication

    › Insider Threats and Countermeasures

    › Intrusion Detection & Prevention

    › Identity and Trust Management

    › Biometric Security

    › Trust models and metrics

    › Regulation and Trust Mechanisms

    › Data Integrity

    › Models for Authentication, Trust and Authorization

    › Access Control in Computing Environments

    › Multiuser Information

    Area 2: Network Security and Protocols

    › IPsec, VPNs and Encryption Modes

    › Service and Systems Design and QoS Network Security

    › Fairness Scheduling and QoS Guarantee

    › Reliability and Dependability

    › Web Performance and Reliability

    › Denial of Service and Other Attacks

    › Data and Systems Security

    › Data Access & Synchronization

    › GPRS and CDMA Security

    › Mobile System Security

    › Ubiquitous Computing Security

    › Security in Localization Systems

    › Sensor and Mobile Ad Hoc Network Security

    › Wireless Network Security (WiFi, WiMAX, WiMedia and Others)

    › Security of GSM/GPRS/UMTS Systems

    › Peer-to-Peer Security

    › e-Commerce Protocols and Micropayment Schemes

    Area 3: Cryptographic Techniques and Key Management

    › Smart Card Security

    › Public Key Crypto Applications

    › Coding Theory and Practice

    › Spread Spectrum Systems

    › Speech/Image Coding

    › Shannon Theory

    › Stochastic Processes

    › Quantum Information Processing

    › Mobile Code & Agent Security

    › Digital Rights Management

    Area 4: Information Assurance

    › Planning Security

    › Risk Assessment

    › Security Area Control

    › Organizational Security Policies and Responsability

    › Security Through Collaboration

    › Human Factors and Human Behaviour Recognition Techniques

    › Ethical and Legal Implications

    › Intrusive, Explicit Security vs. Invisible, Implicit Computing

    › Information Hiding

    › Information Systems Auditing

    › Management of Computing Security

    Area 5: Security in Information Systems and Software Engineering

    › Secure Software Development Methodologies

    › Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)

    › Security Information Systems Architecture and Design and Security Patterns

    › Security and secure testing

    › Security Implementation

    › Security Verification and Validation

    › Security Deployment

    › Security for Grid Computing and Web Services

    › Security for Databases and Data Warehouses

    › Security Engineering

    › Model Driven Security, MDA and automated development

    › Security Metrics and Measurement

    › Personal Data Protection for Information Systems

    › Workflow and Business Process Security

    › Security for Agile Software Development

    › Case studies and experiences of secure software

    Keynote Speakers

    (To be announced)

    Paper Submission

    Authors should submit an original paper in English, carefully checked for correct grammar and spelling, using the on-line submission procedure. Please check the paper formats so you may be aware of the accepted paper page limits.

    The guidelines for paper formatting provided at the conference web site must be strictly used for all submitted papers. The submission format is the same as the camera-ready format. Please check and carefully follow the instructions and templates provided.

    Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable.

    Papers that are out of the conference scope or contain any form of plagiarism will be rejected without reviews.

    Remarks about the on-line submission procedure:

    1. A "double-blind" paper evaluation method will be used. To facilitate that, the authors are kindly requested to produce and provide the paper, WITHOUT any reference to any of the authors. This means that is necessary to remove the authors personal details, the acknowledgements section and any reference that may disclose the authors identity.

    LaTeX/PS/PDF/DOC/DOCX/RTF format are accepted.

    2. The web submission procedure automatically sends an acknowledgement, by e-mail, to the contact author.

    Paper submission types:

    Regular Paper Submission

    A regular paper presents a work where the research is completed or almost finished. It does not necessary means that the acceptance is as a full paper. It may be accepted as a "full paper" (30 min. oral presentation) , a "short paper" (20 min. oral presentation) or a "poster".

    Position Paper Submission

    A position paper presents an arguable opinion about an issue. The goal of a position paper is to convince the audience that your opinion is valid and worth listening to, without the need to present completed research work and/or validated results. It is, nevertheless, important to support your argument with evidence to ensure the validity of your claims. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topic areas. The acceptance of a position paper is restricted to the categories of "short paper" or "poster", i.e. a position paper is not a candidate to acceptance as "full paper".

    Camera-ready:

    After the reviewing process is completed, the contact author (the author who submits the paper) of each paper will be notified of the result, by e-mail. The authors are required to follow the reviews in order to improve their paper before the camera-ready submission.

    All accepted papers will be published in the proceedings, under an ISBN reference, in paper and in CD-ROM support.

    Publications

    All accepted papers will be published in the conference proceedings, under an ISBN reference, in paper and in CD-ROM support.

    A book including a selection of the best conference papers will be edited and published by Springer-Verlag.

    The proceedings will be indexed by ISI Proceedings, INSPEC and DBLP.

    EI already agreed to index the proceedings of SECRYPT 2006 and 2007. Proceedings of SECRYPT 2008 are under evaluation and the proceedings of SECRYPT 2009 will be evaluated by EI after their publication.

    Important Deadlines

    › Regular Paper Submission: February 17, 2009

    › Author Notification: April 16, 2009

    › Final Paper Submission and Registration: April 30, 2009

    › Conference Date: July 7-10, 2009

    Secretariat

    SECRYPT Secretariat

    Av. D. Manuel I, 27A, 2.º esq., 2910-595 Set¨?bal, Portugal

    Tel.: +351 265 520 185

    Fax: +44 203 014 5432

    E-mail: secretariatatsecrypt.org

    Web: http://www.secrypt.org/

    Important Deadlines

    Milan (Milano), situated on the flat plains of the Po Valley, is the capital of Lombardy and thoroughly enjoys its hard earned role as Italy's richest and second largest city. Wealthy and cosmopolitan, the Milanesi enjoy a reputation as successful businesspeople, equally at home overseas and in Italy. Embracing tradition, sophistication and ambition in equal measure, they are just as likely to follow opera at La Scala as their shares on the city's stock market or AC or Inter at the San Siro Stadium.

    Three times in its history, the city had to rebuild after being conquered. Founded in the seventh century BC by Celts, the city, then known as Mediolanum ('mid-plain'), was first sacked by the Goths in the 600s (AD), then by Barbarossa in 1157 and finally by the Allies in World War II, when over a quarter of the city was flattened. Milan successively reinvented herself under French, Spanish and then Austrian rulers from 1499 until the reunification of Italy in 1870. It is a miracle that so many historic treasures still exist, including Leonardo da Vinci's Last Supper, which survived a direct hit in World War II. The Milanesi's appreciation of tradition includes a singular respect for religion; they even pay a special tax towards the Cathedral maintenance. It is therefore fitting that the city's enduring symbol is the gilded statue of the Virgin, on top of the Cathedral (Il Duomo).

    Milan is founded around a historic nucleus radiating from the Cathedral, with a star-shaped axis of arteries spreading through modern suburbs to the ring road. The modern civic center lies to the northwest, around Mussolini's central station, and is dominated by the Pirelli skyscraper, which dates from 1956. The trade and fashion fairs take place in the Fiera district, west of the nucleus around the Porta Genova station. Milan's economic success was founded at the end of the 19th century, when the metal factories and the rubber industries moved in, replacing agriculture and mercantile trading as the city's main sources of income. Milan's position at the heart of a network of canals, which provided the irrigation for the Lombard plains and the important trade links between the north and south, became less important as industry took over - and the waterways were filled. A few canals remain in the Navigli district near the Bocconi University, a fashionable area in which to drink and listen to live music.

    Since the 1970s, Milan has remained the capital of Italy's automobile industry and its financial markets, but the limelight is dominated by the fashion houses, who, in turn, have drawn media and advertising agencies to the city. Milan remains the marketplace for Italian fashion - fashion aficionados, supermodels and international paparazzi descend upon the city twice a year for its spring and autumn fairs. Valentino, Versace and Armani may design and manufacture their clothes elsewhere but Milan, which has carefully guarded its reputation for flair, drama and creativity, is Italy's natural stage.

    Conference Co-chairs

    Joaquim Filipe (Polytechnic Institute of Set¨?bal / INSTICC, Portugal)

    Mohammad S. Obaidat (Monmouth University, United States)

    Program Co-chairs

    Manu Malek (Stevens Institute of Technology, United States)

    Eduardo Fern¨¢ndez-Medina (UCLM, Spain)

    Javier Hernando (Polytechnic University of Catalonia, Spain)


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.