Abbrevation
SECRYPT
City
Reykjavik
Country
Iceland
Deadline Paper
Start Date
End Date
Abstract

<p class="MsoNormal"><span lang="EN&#8211;US">The purpose of SECRYPT 2013, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication&#046; Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing&#046; In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e&#8211;business, internet and global enterprises&#046;</span></p> <p class="MsoNormal"><span lang="EN&#8211;US">Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics that can be listed, as indicated below&#046;</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"></span></p><p> </p> <p class="MsoNormal"><span lang="EN&#8211;US">Conference Topics</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"></span></p><p> </p> <p class="MsoNormal"><span lang="EN&#8211;US"> </span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Access Control</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Applied Cryptography</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Biometrics Security and Privacy</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Critical Infrastructure Protection</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Data Integrity</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Data Protection</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Database Security and Privacy</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Digital Forensics</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Digital Rights Management</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Ethical and Legal Implications of Security and Privacy</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Formal Methods for Security</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Human Factors and Human Behavior Recognition Techniques</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Identification, Authentication and Non&#8211;repudiation</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Identity Management</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Information Hiding</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Information Systems Auditing</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Insider Threats and Countermeasures</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Intellectual Property Protection</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Intrusion Detection &amp; Prevention</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Management of Computing Security</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Network Security</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Organizational Security Policies</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Peer&#8211;to&#8211;Peer Security</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Personal Data Protection for Information Systems</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Privacy</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Privacy Enhancing Technologies</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Reliability and Dependability</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Risk Assessment</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Secure Software Development Methodologies</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security and privacy in Complex Systems</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security and Privacy in Crowdsourcing</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security and Privacy in IT Outsourcing</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security and Privacy in Location&#8211;based Services</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security and Privacy in Mobile Systems</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security and Privacy in Pervasive/Ubiquitous Computing</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security and Privacy in Smart Grids</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security and Privacy in Social Networks</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security and Privacy in the Cloud</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security and Privacy in Web Services</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security and Privacy Policies</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security Area Control</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security Deployment</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security Engineering</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security in Distributed Systems</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security Information Systems Architecture</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security Management</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security Metrics and Measurement</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security Protocols</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security requirements</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Security Verification and Validation</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Sensor and Mobile Ad Hoc Network Security</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Service and Systems Design and QoS Network Security</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Software Security</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Trust management and Reputation Systems</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Ubiquitous Computing Security</span></p> <p class="MsoNormal"><span lang="EN&#8211;US"> Wireless Network Security</span></p><p class="MsoNormal"><span lang="EN&#8211;US"><br></span></p>