SECRYPT

From Openresearch
Revision as of 14:40, 5 February 2010 by Calendar Sites (talk | contribs) (New page: {{Event |Acronym=SECRYPT |Title=International Conference on Security and Cryptography |Type=Conference |Field=Computer security and reliability |Start date=2010/07/26 |End date=2010/07/28 ...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
SECRYPT
International Conference on Security and Cryptography
Dates 2010/07/26 (iCal) - 2010/07/28
Homepage: www.secrypt.icete.org/
Location
Location: Athens, Greece
Loading map...

Important dates
Papers: 2010/02/26
Submissions: 2010/02/26
Notification: 2010/04/08
Camera ready due: 2010/04/22
Table of Contents


Conference name: International Conference on Security and Cryptography (SECRYPT)

Venue: Athens - Greece


Event Date: 26-28 July, 2010

The purpose of SECRYPT 2010, the International Conference on Security and Cryptography, is to bring together researchers, engineers and practitioners interested on information systems and applications in the context of wireless networks and mobile technologies.

CONFERENCE AREAS

   *  › Access Control and Intrusion Detection
   * › Network Security and Protocols
   * › Cryptographic Techniques and Key Management
   * › Information Assurance
   * › Security in Information Systems and Software Engineering

Area 1: Access Control and Intrusion Detection


   * › Intrusion Detection and Vulnerability Assessment
   * › Identification, Authentication and Non-repudiation
   * › Insider Threats and Countermeasures
   * › Intrusion Detection & Prevention
   * › Biometric Security
   * › Regulation and Trust Mechanisms
   * › Data Integrity
   * › Models for Authentication, Trust and Authorization
   * › Access Control in Computing Environments
   * › Data Access & Synchronization
   * › Security in Distributed Systems

Area 2: Network Security and Protocols


   * › IPsec, VPNs and Encryption Modes
   * › Service and Systems Design and QoS Network Security
   * › Reliability and Dependability
   * › Web Performance and Reliability
   * › Denial of Service and Other Attacks
   * › Data and Systems Security
   * › Mobile System Security
   * › Ubiquitous Computing Security
   * › Sensor and Mobile Ad Hoc Network Security
   * › Wireless Network Security (WiFi, WiMAX, WiMedia and Others)
   * › Peer-to-Peer Security
   * › Phishing, adfraud, malware, and countermeasures
   * › Active Defense Systems

Area 3: Cryptographic Techniques and Key Management


   * › Smart Card Security
   * › Public Key Crypto Applications
   * › Coding Theory and Practice
   * › Speech/Image Coding
   * › Shannon Theory
   * › Mobile Code & Agent Security
   * › Digital Rights Management
   * › Digital Forensics

Area 4: Information Assurance


   * › Planning Security
   * › Risk Assessment
   * › Security Area Control
   * › Organizational Security Policies and Responsability
   * › Security Through Collaboration
   * › Human Factors and Human Behaviour Recognition Techniques
   * › Ethical and Legal Implications
   * › Information Hiding
   * › Information Systems Auditing
   * › Management of Computing Security
   * › Intellectual Property Protection

Area 5: Security in Information Systems and Software Engineering


   * › Secure Software Development Methodologies
   * › Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
   * › Security Information Systems Architecture and Design and Security Patterns
   * › Security Implementation
   * › Security Verification and Validation
   * › Security Deployment
   * › Security for Grid Computing and Web Services
   * › Security Engineering
   * › Security Metrics and Measurement
   * › Personal Data Protection for Information Systems


IMPORTANT DATES

› Conference date: 26-28 July, 2010

Regular Paper Submission: February 26, 2010 (deadline extended) Authors Notification (regular papers): April 08, 2010 Final Regular Paper Submission and Registration: April 22, 2010


Contacts:

SECRYPT Secretariat Adress: Av. D. Manuel I, 27A, 2º esq.

          2910-595 Setúbal - Portugal

Tel.: +351 265 520 185 Fax: +44 203 014 5432


Event Site: http://www.secrypt.icete.org/

Event E-mail:secrypt.secretariat@insticc.org

Facts about "SECRYPT"
AcronymSECRYPT +
Camera ready dueApril 22, 2010 +
End dateJuly 28, 2010 +
Event typeConference +
Has coordinates37° 59' 2", 23° 43' 42"Latitude: 37.983941666667
Longitude: 23.728305555556
+
Has location cityAthens +
Has location countryCategory:Greece +
Homepagehttp://www.secrypt.icete.org/ +
IsAEvent +
NotificationApril 8, 2010 +
Paper deadlineFebruary 26, 2010 +
Start dateJuly 26, 2010 +
Submission deadlineFebruary 26, 2010 +
TitleInternational Conference on Security and Cryptography +