Abbrevation
SECRYPT
City
Prague
Country
Czechia
Deadline Paper
Start Date
End Date
Abstract

SECRYPT is an annual international conference covering research in information and communication security&#046; The 16th International Conference on Security and Cryptography (SECRYPT 2019) will be held in Prague, Czech Republic on 26&#8211;28 July 2019&#046; The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography&#046; Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged&#046; Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged&#046;<br>Conference Topics:<br>Area 1: SECRYPT &#8211; International Conference on Security and Cryptography<br>&#8211; Access Control<br>&#8211; Applied Cryptography<br>&#8211; Biometrics Security and Privacy<br>&#8211; Critical Infrastructure Protection<br>&#8211; Data Integrity<br>&#8211; Data Protection<br>&#8211; Database Security and Privacy<br>&#8211; Digital Forensics<br>&#8211; Digital Rights Management<br>&#8211; Ethical and Legal Implications of Security and Privacy<br>&#8211; Formal Methods for Security<br>&#8211; Human Factors and Human Behavior Recognition Techniques<br>&#8211; Identification, Authentication and Non&#8211;repudiation<br>&#8211; Identity Management<br>&#8211; Information Hiding<br>&#8211; Information Systems Auditing<br>&#8211; Insider Threats and Countermeasures<br>&#8211; Intellectual Property Protection<br>&#8211; Intrusion Detection &amp; Prevention<br>&#8211; Management of Computing Security<br>&#8211; Network Security<br>&#8211; Organizational Security Policies<br>&#8211; Peer&#8211;to&#8211;Peer Security<br>&#8211; Personal Data Protection for Information Systems<br>&#8211; Privacy<br>&#8211; Privacy Enhancing Technologies<br>&#8211; Reliability and Dependability<br>&#8211; Risk Assessment<br>&#8211; Secure Software Development Methodologies<br>&#8211; Security and Privacy for Big Data<br>&#8211; Security and privacy in Complex Systems<br>&#8211; Security and Privacy in Crowdsourcing<br>&#8211; Security and Privacy in IT Outsourcing<br>&#8211; Security and Privacy in Location&#8211;based Services<br>&#8211; Security and Privacy in Mobile Systems<br>&#8211; Security and Privacy in Pervasive/Ubiquitous Computing<br>&#8211; Security and Privacy in Smart Grids<br>&#8211; Security and Privacy in Social Networks<br>&#8211; Security and Privacy in the Cloud<br>&#8211; Security and Privacy in Web Services<br>&#8211; Security and Privacy Policies<br>&#8211; Security Area Control<br>&#8211; Security Deployment<br>&#8211; Security Engineering<br>&#8211; Security in Distributed Systems<br>&#8211; Security Information Systems Architecture<br>&#8211; Security Management<br>&#8211; Security Metrics and Measurement<br>&#8211; Security Protocols<br>&#8211; Security requirements<br>&#8211; Security Verification and Validation<br>&#8211; Sensor and Mobile Ad Hoc Network Security<br>&#8211; Service and Systems Design and QoS Network Security<br>&#8211; Software Security<br>&#8211; Trust management and Reputation Systems<br>&#8211; Ubiquitous Computing Security<br>&#8211; Wireless Network Security<br>