16th International Conference on Security and Cryptography SECRYPT is part of ICETE, the 16th International Joint Conference on e-business and Telecommunications. Registration to SECRYPT allows free access to all other ICETE conferences. ICETE 2019 will be held in conjunction with ICSOFT 2019 and DATA 2019. Registration to ICETE allows free access to the ICSOFT and DATA conferences (as a non-speaker). Upcoming Deadlines Regular Paper Submission Extension: March 21, 2019 Regular Paper Authors Notification: May 2, 2019 Regular Paper Camera Ready and Registration: May 16, 2019 SECRYPT is an annual international conference covering research in information and communication security. The 16th International Conference on Security and Cryptography (SECRYPT 2019) will be held in Prague, Czech Republic on 26-28 July 2019. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged. Conference Chair Mohammad Obaidat1, University of Jordan, Jordan and Nazarbayev University, Kazakhstan 1 Received the IEEE ComSoc Technical Achievement Award at GlobeCom 2018 PROGRAM CHAIR Pierangela Samarati, Università degli Studi di Milano, Italy Keynote Speakers V.S. Subrahmanian, Dartmouth College, United States Jalel Ben-Othman, University of Paris 13, France Doctoral Consortium Submission: May 29, 2019 Open Communications Submission: May 29, 2019 SCOPE SECRYPT is an annual international conference covering research in information and communication security. The 16th International Conference on Security and Cryptography (SECRYPT 2019) will be held in Prague, Czech Republic on 26-28 July 2019. The conference seeks submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of data protection, privacy, security, and cryptography. Papers describing the application of security technology, the implementation of systems, and lessons learned are also encouraged. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and vision papers indicating future directions are also encouraged. CONFERENCE TOPICS
Access Control Applied Cryptography Biometrics Security and Privacy Critical Infrastructure Protection Data Integrity Data Protection Database Security and Privacy Digital Forensics Digital Rights Management Ethical and Legal Implications of Security and Privacy Formal Methods for Security Human Factors and Human Behavior Recognition Techniques Identification, Authentication and Non-Repudiation Identity Management Information Hiding Information Systems Auditing Insider Threats and Countermeasures Intellectual Property Protection Intrusion Detection & Prevention Management of Computing Security Network Security Organizational Security Policies Peer-to-Peer Security Personal Data Protection for Information Systems Privacy Privacy Enhancing Technologies Reliability and Dependability Risk Assessment Secure Software Development Methodologies Security and Privacy for Big Data Security and Privacy in Complex Systems Security and Privacy in Crowdsourcing Security and Privacy in IT Outsourcing Security and Privacy in Location-Based Services Security and Privacy in Mobile Systems Security and Privacy in Pervasive/Ubiquitous Computing Security and Privacy in Smart Grids Security and Privacy in Social Networks Security and Privacy in the Cloud Security and Privacy in Web Services Security and Privacy Policies Security Area Control Security Deployment Security Engineering Security in Distributed Systems Security Information Systems Architecture Security Management Security Metrics and Measurement Security Protocols Security Requirements Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security Service and Systems Design and QoS Network Security Software Security Trust Management and Reputation Systems Ubiquitous Computing Security Wireless Network Security ICETE KEYNOTE SPEAKERS V.S. Subrahmanian, Dartmouth College, United States Jalel Ben-Othman, University of Paris 13, France Please contact the event manager Marilyn (marilyn.b.turner@nyeventslist.com ) below for: - Multiple participant discounts - Price quotations or visa invitation letters - Payment by alternate channels (PayPal, check, Western Union, wire transfers etc) - Event sponsorships NO REFUNDS ALLOWED ON REGISTRATIONS Service fees included in this listing. ----------------------------------------------------------------- INSTICC- New York Events List http://www.nyeventslist.com http://www.bostoneventslist.com http://www.sfbayeventslist.com ----------------------------------------------------------------- JOA190514CEV