-------- Weitergeleitete Nachricht -------- Betreff: [computational.science] SECRYPT 2016 - Position papers deadline extended Datum: Mon, 11 Apr 2016 23:49:11 +0200 Von: SECRYPT 2016 secrypt2016@unimi.it An: Computational Science Mailing List computational.science@lists.iccsa.org
CALL FOR POSITION PAPERS
*** Submission Deadline Extended to April 21, 2016 (11:59PM American Samoa time) ***
************************************************************************ 13th International Conference on Security and Cryptography (SECRYPT 2016) Lisbon, Portugal, 26-28 July 2016 http://secrypt.icete.org ************************************************************************
The 13th International Conference on Security and Cryptography (SECRYPT 2016) to be held in Lisbon, Portugal, 26-28 July 2016, is now welcoming the submission of position papers whose deadline is extended to April 21, 2016.
A position paper presents an arguable opinion about an issue. The goal of a position paper is to convince the audience that your opinion is valid and worth listening to, without the need to present completed research work and/or validated results. It is, nevertheless, important to support your argument with evidence to ensure the validity of your claims. A position paper may be a short report and discussion of ideas, facts, situations, methods, procedures or results of scientific research (bibliographic, experimental, theoretical, or other) focused on one of the conference topics. Please check further details about position papers submission at the conference website http://www.secrypt.icete.org/Guidelines.aspx
CONFERENCE TOPICS The conference topics include, but are not limited to:
Access Control Applied Cryptography Biometrics Security and Privacy Critical Infrastructure Protection Data Integrity Data Protection Database Security and Privacy Digital Forensics Digital Rights Management Ethical and Legal Implications of Security and Privacy Formal Methods for Security Human Factors and Human Behavior Recognition Techniques Identification, Authentication and Non-repudiation Identity Management Information Hiding Information Systems Auditing Insider Threats and Countermeasures Intellectual Property Protection Intrusion Detection & Prevention Management of Computing Security Network Security Organizational Security Policies Peer-to-Peer Security Personal Data Protection for Information Systems Privacy Privacy Enhancing Technologies Reliability and Dependability Risk Assessment Secure Software Development Methodologies Security and privacy in Complex Systems Security and Privacy in Crowdsourcing Security and Privacy in IT Outsourcing Security and Privacy in Location-based Services Security and Privacy in Mobile Systems Security and Privacy in Pervasive/Ubiquitous Computing Security and Privacy in Smart Grids Security and Privacy in Social Networks Security and Privacy in the Cloud Security and Privacy in Web Services Security and Privacy Policies Security Area Control Security Deployment Security Engineering Security in Distributed Systems Security Information Systems Architecture Security Management Security Metrics and Measurement Security Protocols Security requirements Security Verification and Validation Sensor and Mobile Ad Hoc Network Security Service and Systems Design and QoS Network Security Software Security Trust management and Reputation Systems Ubiquitous Computing Security Wireless Network Security
POSITION PAPERS SUBMISSION Submitted papers must be in English and must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions are to be made to the submission web site at http://www.insticc.org/primoris/.
Submitted papers must be formatted according to the SECRYPT format, which is described at http://secrypt.icete.org/Guidelines.aspx . After a double-blind peer review, qualifying Position Papers will be accepted as Short Papers. Submission page limit is 8 pages. Accepted papers will be subject to the limit of 8 pages for short papers with oral presentation, and 6 pages for short papers with poster presentation. Authors of accepted papers must guarantee that their papers will be presented at the conference. All papers presented in the conference will be published in the conference proceedings and in the digital library.
IMPORTANT DATES (Position Papers only)
- Paper Submission: April 21, 2016 (11:59PM American Samoa time) [extended] - Authors Notification: May 18, 2016 - Camera Ready and Registration: June 2, 2016
PROGRAM CHAIR Pierangela Samarati, Universita' degli Studi di Milano, Italy
PROGRAM COMMITTEE Luis Filipe Antunes, University of Porto, Portugal Alessandro Armando, FBK, Italy Prithvi Bisht, Adobe, United States Carlo Blundo, UniversitA’ di Salerno, Italy Andrey Bogdanov, Technical University of Denmark, Denmark Francesco Buccafurri, University of Reggio Calabria, Italy Dario Catalano, Universita' degli Studi di Catania, Italy Meshram Chandrashekhar, R D University, India Sherman SM Chow, Chinese University of Hong Kong, Hong Kong Frederic Cuppens, TELECOM Bretagne, France Nora Cuppens-Boulahia, Institut Mines Telecom / Telecom Bretagne, France Jun Dai, California State University, United States Sabrina De Capitani di Vimercati, Universita’ degli Studi di Milano, Italy Roberto Di Pietro, Universita' di Roma Tre, Italy Tassos Dimitriou, Computer Technology Institute, Greece and Kuwait University, Kuwait Josep Domingo-Ferrer, Universitat Rovira i Virgili, Spain Ruggero Donida Labati, Universita’ degli Studi di Milano, Italy Alberto Ferrante, Universita’ della Svizzera Italiana, Switzerland Josep-Lluis Ferrer-Gomila, Balearic Islands University, Spain William M. Fitzgerald, United Technologies Research Center Ireland (UTRCI), Ireland Sara Foresti, Universita' degli Studi di Milano, Italy Steve Furnell, Plymouth University, United Kingdom Joaquin Garcia-Alfaro, Institut Mines-Telecom, TELECOM SudParis, France Mark Gondree, Naval Postgraduate School, United States Dimitris Gritzalis, AUEB, Greece Sotiris Ioannidis, Foundation for Research and Technology - Hellas, Greece Wael Kanoun, ALCATEL-LUCENT, France Murat Kantarcioglu, University of Texas at Dallas, United States Sokratis Katsikas, Giovik University College, Norway Florian Kerschbaum, SAP, Germany Shinsaku Kiyomoto, KDDI R&D Laboratories Inc., Japan Costas Lambrinoudakis, University of Piraeus, Greece Albert Levi, Sabanci University, Turkey Jiguo Li, Hohai University, China Peng Liu, Penn. State University, United States Giovanni Livraga, Universita’ degli Studi di Milano, Italy Javier Lopez, University of Malaga, Spain Haibing Lu, Santa Clara University, United States Evangelos Markatos, University of Crete, Greece Olivier Markowitch, Universite’ Libre de Bruxelles, Belgium Fabio Martinelli, IIT-CNR, Italy Vashek Matyas, Masaryk University, Czech Republic Carlos Maziero, UFPR - Federal University of Parana’, Brazil Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan Refik Molva, Eurecom, France Eiji Okamoto, University of Tsukuba, Japan Rolf Oppliger, eSECURITY Technologies, Switzerland Stefano Paraboschi, University of Bergamo, Italy Joon Park, Syracuse University, United States Gerardo Pelosi, Politecnico di Milano, Italy Gunther Pernul, University of Regensburg, Germany Joachim Posegga, Institute of IT Security and Security Law, Germany Silvio Ranise, Fondazione Bruno Kessler, Italy Indrakshi Ray, Colorado State University, United States Kui Ren, State University of New York at Buffalo, United States Nuno Santos, University of Lisbon, Portugal Andreas Schaad, Huawei European Research Center, Germany Cristina Serban, AT&T Security Research Center, United States Daniele Sgandurra, Imperial College London, United Kingdom Willy Susilo, University of Wollongong, Australia Juan Tapiador, Universidad Carlos III de Madrid, Spain Vicenc Torra, University of Skövde, Sweden Jaideep Vaidya, Rutgers Business School, United States Luca Vigano’, University of Verona, Italy Corrado Aaron Visaggio, Universita’ degli Studi del Sannio, Italy Ivan Visconti, Universita’ di Salerno, Italy Cong Wang, City University of Hong Kong, Hong Kong Haining Wang, The College of William and Mary, United States Lingyu Wang, Concordia University, Canada Xinyuan (Frank) Wang, George Mason University, United States Edgar Weippl, SBA Research / TU Wien, Austria Qiben Yan, University of Nebraska Lincoln, United States Meng Yu, The University of Texas at San Antonio, United States Jiawei Yuan, Embry-Riddle Aeronautical University, United States Lei Zhang, Thomson Reuters, United States
For any questions, please contact the program chair: secrypt2016@unimi.it --------------------------------------------------------------------- To unsubscribe, e-mail: computational.science-unsubscribe@lists.iccsa.org For additional commands, e-mail: computational.science-help@lists.iccsa.org