Abbrevation
SECRYPT
City
Colmar
Country
France
Deadline Paper
Start Date
End Date
Abstract

SECRYPT is an annual international conference covering research in<br>information and communication security&#046; The 12th International<br>Conference on Security and Cryptography (SECRYPT 2015) will be held in<br>Colmar, France, 20&#8211;22 July 2015&#046; The conference seeks submissions from<br>academia, industry, and government presenting novel research on all<br>theoretical and practical aspects of data protection, privacy, security,<br>and cryptography&#046; Papers describing the application of security technology,<br>the implementation of systems, and lessons learned are also encouraged&#046;<br>CONFERENCE TOPICS<br>The conference topics include, but are not limited to:<br>Access Control<br>Applied Cryptography<br>Biometrics Security and Privacy<br>Critical Infrastructure Protection<br>Data Integrity<br>Data Protection<br>Database Security and Privacy<br>Digital Forensics<br>Digital Rights Management<br>Ethical and Legal Implications of Security and Privacy<br>Formal Methods for Security<br>Human Factors and Human Behavior Recognition Techniques<br>Identification, Authentication and Non&#8211;repudiation<br>Identity Management<br>Information Hiding<br>Information Systems Auditing<br>Insider Threats and Countermeasures<br>Intellectual Property Protection<br>Intrusion Detection &amp; Prevention<br>Management of Computing Security<br>Network Security<br>Organizational Security Policies<br>Peer&#8211;to&#8211;Peer Security<br>Personal Data Protection for Information Systems<br>Privacy<br>Privacy Enhancing Technologies<br>Reliability and Dependability<br>Risk Assessment<br>Secure Software Development Methodologies<br>Security and privacy in Complex Systems<br>Security and Privacy in Crowdsourcing<br>Security and Privacy in IT Outsourcing<br>Security and Privacy in Location&#8211;based Services<br>Security and Privacy in Mobile Systems<br>Security and Privacy in Pervasive/Ubiquitous Computing<br>Security and Privacy in Smart Grids<br>Security and Privacy in Social Networks<br>Security and Privacy in the Cloud<br>Security and Privacy in Web Services<br>Security and Privacy Policies<br>Security Area Control<br>Security Deployment<br>Security Engineering<br>Security in Distributed Systems<br>Security Information Systems Architecture<br>Security Management<br>Security Metrics and Measurement<br>Security Protocols<br>Security requirements<br>Security Verification and Validation<br>Sensor and Mobile Ad Hoc Network Security<br>Service and Systems Design and QoS Network Security<br>Software Security<br>Trust management and Reputation Systems<br>Ubiquitous Computing Security<br>Wireless Network Security<br>