SECRYPT 2019 : International Conference on Security and Cryptography

  in Conferences   Posted on December 30, 2018

Conference Information

Submission Deadline Thursday 28 Feb 2019
Conference & Submission Link http://www.secrypt.icete.org/
Conference Dates Jul 26, 2019 - Jul 28, 2019
Conference Address Prague, Czech Republic
Proceedings indexed by
Conference Organizers : ( Deadline extended ? Click here to edit )

Conference Call for Papers

CALL FOR PAPERS

International Conference on Security and Cryptography SECRYPT

website: http://www.secrypt.icete.org/

July 26 – 28, 2019 Prague, Czech Republic

Proceedings will be submitted for indexation by: DBLP, Thomson Reuters, EI, SCOPUS, Semantic Scholar and Google Scholar.

IMPORTANT DATES:

Regular Paper Submission: February 28, 2019

Authors Notification (regular papers): May 2, 2019

Final Regular Paper Submission and Registration: May 16, 2019

Scope:

SECRYPT is an annual international conference covering research in information and communication security. The 16th International Conference on Security and Cryptography (SECRYPT 2019) will be held in Prague, Czech Republic on 26-28 July 2019. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged.

Conference Topics:

Area 1: SECRYPT – International Conference on Security and Cryptography

– Access Control

– Applied Cryptography

– Biometrics Security and Privacy

– Critical Infrastructure Protection

– Data Integrity

– Data Protection

– Database Security and Privacy

– Digital Forensics

– Digital Rights Management

– Ethical and Legal Implications of Security and Privacy

– Formal Methods for Security

– Human Factors and Human Behavior Recognition Techniques

– Identification, Authentication and Non-repudiation

– Identity Management

– Information Hiding

– Information Systems Auditing

– Insider Threats and Countermeasures

– Intellectual Property Protection

– Intrusion Detection & Prevention

– Management of Computing Security

– Network Security

– Organizational Security Policies

– Peer-to-Peer Security

– Personal Data Protection for Information Systems

– Privacy

– Privacy Enhancing Technologies

– Reliability and Dependability

– Risk Assessment

– Secure Software Development Methodologies

– Security and Privacy for Big Data

– Security and privacy in Complex Systems

– Security and Privacy in Crowdsourcing

– Security and Privacy in IT Outsourcing

– Security and Privacy in Location-based Services

– Security and Privacy in Mobile Systems

– Security and Privacy in Pervasive/Ubiquitous Computing

– Security and Privacy in Smart Grids

– Security and Privacy in Social Networks

– Security and Privacy in the Cloud

– Security and Privacy in Web Services

– Security and Privacy Policies

– Security Area Control

– Security Deployment

– Security Engineering

– Security in Distributed Systems

– Security Information Systems Architecture

– Security Management

– Security Metrics and Measurement

– Security Protocols

– Security requirements

– Security Verification and Validation

– Sensor and Mobile Ad Hoc Network Security

– Service and Systems Design and QoS Network Security

– Software Security

– Trust management and Reputation Systems

– Ubiquitous Computing Security

– Wireless Network Security

SECRYPT CONFERENCE CHAIR:

Mohammad Obaidat, University of Jordan, Jordan and Nazarbayev University, Kazakhstan

SECRYPT PROGRAM CHAIR:

Pierangela Samarati, UniversitĂ  degli Studi di Milano, Italy

PROGRAM COMMITTEE

http://www.secrypt.icete.org//ProgramCommittee.aspx

SECRYPT Secretariat

Address: Av. D. Manuel I, 27A, 2Âș esq.

Tel: +351 265 520 185

Fax: +351 265 520 186

Web: http://www.secrypt.icete.org/

e-mail: secrypt.secretariat@insticc.org

Other Conferences in Czech Republic

HCVS 2019 : 6th Workshop on Horn Clauses for Verification and Synthesis

Deadline :
Fri 15 Feb 2019
Apr 7, 2019 - Apr 7, 2019 - Prague
Czech Republic