International Conference on Security and Cryptography
SECRYPT 2009 – International Conference on Security and Cryptography: July 7-10, Milan, Italy
July 7-10     Milan, Italy
Call for Papers


The purpose of SECRYPT 2009, the International Conference on Security and Cryptography, is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication. Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focuses on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.
Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography, as well as many other topics that can be listed, as indicated below.

Ideas on how to analyze and approach security problems by combining information and communication technologies with the appropriate theoretical work including information theory and communication theory, either in the scope of R&D projects, engineering or business applications, are welcome. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged. Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of SECRYPT, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and poster sessions.
The best papers will be selected to appear either in an international journal or in a book to be published by Springer.

Special sessions, case studies and tutorials dedicated to technical/scientific topics related to the main conference are also envisaged: researchers interested in organizing a special session, or companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat.

Conference Areas
Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:

  • › Access Control and Intrusion Detection
  • › Network Security and Protocols
  • › Cryptographic Techniques and Key Management
  • › Information Assurance
  • › Security in Information Systems and Software Engineering
Area 1: Access Control and Intrusion Detection
  • › Intrusion Detection and Vulnerability Assessment
  • › Authentication and Non-repudiation
  • › Identification and Authentication
  • › Insider Threats and Countermeasures
  • › Intrusion Detection & Prevention
  • › Identity and Trust Management
  • › Biometric Security
  • › Trust models and metrics
  • › Regulation and Trust Mechanisms
  • › Data Integrity
  • › Models for Authentication, Trust and Authorization
  • › Access Control in Computing Environments
  • › Multiuser Information
Area 2: Network Security and Protocols
  • › IPsec, VPNs and Encryption Modes
  • › Service and Systems Design and QoS Network Security
  • › Fairness Scheduling and QoS Guarantee
  • › Reliability and Dependability
  • › Web Performance and Reliability
  • › Denial of Service and Other Attacks
  • › Data and Systems Security
  • › Data Access & Synchronization
  • › GPRS and CDMA Security
  • › Mobile System Security
  • › Ubiquitous Computing Security
  • › Security in Localization Systems
  • › Sensor and Mobile Ad Hoc Network Security
  • › Wireless Network Security (WiFi, WiMAX, WiMedia and Others)
  • › Security of GSM/GPRS/UMTS Systems
  • › Peer-to-Peer Security
  • › e-Commerce Protocols and Micropayment Schemes
  • › Phishing, adfraud, malware, and countermeasures
Area 3: Cryptographic Techniques and Key Management
  • › Smart Card Security
  • › Public Key Crypto Applications
  • › Coding Theory and Practice
  • › Spread Spectrum Systems
  • › Speech/Image Coding
  • › Shannon Theory
  • › Stochastic Processes
  • › Quantum Information Processing
  • › Mobile Code & Agent Security
  • › Digital Rights Management
Area 4: Information Assurance
  • › Planning Security
  • › Risk Assessment
  • › Security Area Control
  • › Organizational Security Policies and Responsability
  • › Security Through Collaboration
  • › Human Factors and Human Behaviour Recognition Techniques
  • › Ethical and Legal Implications
  • › Intrusive, Explicit Security vs. Invisible, Implicit Computing
  • › Information Hiding
  • › Information Systems Auditing
  • › Management of Computing Security
Area 5: Security in Information Systems and Software Engineering
  • › Secure Software Development Methodologies
  • › Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • › Security Information Systems Architecture and Design and Security Patterns
  • › Security and secure testing
  • › Security Implementation
  • › Security Verification and Validation
  • › Security Deployment
  • › Security for Grid Computing and Web Services
  • › Security for Databases and Data Warehouses
  • › Security Engineering
  • › Model Driven Security, MDA and automated development
  • › Security Metrics and Measurement
  • › Personal Data Protection for Information Systems
  • › Workflow and Business Process Security
  • › Security for Agile Software Development
  • › Case studies and experiences of secure software
Keynote Speakers
Pierangela Samarati, University of Milan, Italy
All accepted papers will be published in the conference proceedings, under an ISBN reference, in paper and in CD-ROM support.
A book including a selection of the best conference papers will be edited and published by Springer-Verlag.
The proceedings will be indexed by Conference Proceedings Citation Index, INSPEC and DBLP.
EI already agreed to index the proceedings of SECRYPT 2006 and 2007. Proceedings of SECRYPT 2008 are under evaluation and the proceedings of SECRYPT 2009 will be evaluated by EI after their publication.
Milan (Milano), situated on the flat plains of the Po Valley, is the capital of Lombardy and thoroughly enjoys its hard earned role as Italy's richest and second largest city. Wealthy and cosmopolitan, the Milanesi enjoy a reputation as successful businesspeople, equally at home overseas and in Italy. Embracing tradition, sophistication and ambition in equal measure, they are just as likely to follow opera at La Scala as their shares on the city's stock market or AC or Inter at the San Siro Stadium.
Three times in its history, the city had to rebuild after being conquered. Founded in the seventh century BC by Celts, the city, then known as Mediolanum ('mid-plain'), was first sacked by the Goths in the 600s (AD), then by Barbarossa in 1157 and finally by the Allies in World War II, when over a quarter of the city was flattened. Milan successively reinvented herself under French, Spanish and then Austrian rulers from 1499 until the reunification of Italy in 1870. It is a miracle that so many historic treasures still exist, including Leonardo da Vinci's Last Supper, which survived a direct hit in World War II. The Milanesi's appreciation of tradition includes a singular respect for religion; they even pay a special tax towards the Cathedral maintenance. It is therefore fitting that the city's enduring symbol is the gilded statue of the Virgin, on top of the Cathedral (Il Duomo).
Milan is founded around a historic nucleus radiating from the Cathedral, with a star-shaped axis of arteries spreading through modern suburbs to the ring road. The modern civic center lies to the northwest, around Mussolini's central station, and is dominated by the Pirelli skyscraper, which dates from 1956. The trade and fashion fairs take place in the Fiera district, west of the nucleus around the Porta Genova station. Milan's economic success was founded at the end of the 19th century, when the metal factories and the rubber industries moved in, replacing agriculture and mercantile trading as the city's main sources of income. Milan's position at the heart of a network of canals, which provided the irrigation for the Lombard plains and the important trade links between the north and south, became less important as industry took over - and the waterways were filled. A few canals remain in the Navigli district near the Bocconi University, a fashionable area in which to drink and listen to live music.
Since the 1970s, Milan has remained the capital of Italy's automobile industry and its financial markets, but the limelight is dominated by the fashion houses, who, in turn, have drawn media and advertising agencies to the city. Milan remains the marketplace for Italian fashion - fashion aficionados, supermodels and international paparazzi descend upon the city twice a year for its spring and autumn fairs. Valentino, Versace and Armani may design and manufacture their clothes elsewhere but Milan, which has carefully guarded its reputation for flair, drama and creativity, is Italy's natural stage.
Conference Co-chairs
Joaquim Filipe (Polytechnic Institute of Setúbal / INSTICC, Portugal)
Mohammad S. Obaidat (Monmouth University, United States)
Program Co-chairs
Manu Malek (Stevens Institute of Technology, United States)
Eduardo Fernández-Medina (UCLM, Spain)
Javier Hernando (Polytechnic University of Catalonia, Spain)
Program Committee
Xinyuan (Frank) Wang, George Mason University, United States
Ali A. Ghorbani, University of New Brunswick, Canada
Sudhir Aggarwal, Florida State University, United States
Gordon Agnew, University of Waterloo, Canada
Isaac Agudo, University of Malaga, Spain
Gail-joon Ahn, Arizona State University, United States
Jalal Al Muhtadi, King Saud University, Saudi Arabia
Jörn Altmann, Seoul National University, Korea
Helen Ashman, University of South Australia, Australia
Eduard Babulak, Fairleigh Dickinson University, Canada
Joonsang Baek, Institute For Infocomm Research, Singapore
Yun Bai, University of Western Sydney, Australia
Dan Bailey, Rsa Security, United States
Ken Barker, University of Calgary, Canada
Lejla Batina, Katholieke Universiteit Leuven, Belgium
Peter Bertok, Royal Melbourne Institute of Technology, Australia
Carlo Blundo, Università Di Salerno, Italy
Indranil Bose, The University of Hong Kong, Hong Kong
Rahmat Budiarto, NAv6 Center, University of Sains Malaysia, Malaysia
Pino Caballero Gil, Universidad De La Laguna, Spain
Roy Campbell, Uiuc, United States
Zhenfu Cao, Shanghai JiaoTong University, China
Chin-Chen Chang, Feng Chia University, Taiwan
Pascale Charpin, French National Institute For Research In Computer Science, France
Yu Chen, State University of New York - Binghamton, United States
Zesheng Chen, Florida International University, United States
Girija Chetty, University of Canberra, Australia
Kim-kwang Raymond Choo, (1) Australian Institute of Criminology (2) Australian National University, Australia
Stelvio Cimato, University of Milan, Italy
Debbie Cook, IDA-CCS, United States
Nathalie DAGORN, ICN Business School, France
Paolo D'arco, University of Salerno, Italy
Anupam Datta, Carnegie Mellon University, United States
Sabrina De Capitani Di Vimercati, University of Milan, Italy
Bart De Decker, K.U.Leuven, Belgium
Luis de la Cruz Llopis, Technical University of Catalonia, Spain
Breno de Medeiros, Google, Inc., United States
José Neuman De Souza, Universidade Federal Do Ceará, Brazil
Roberto Di Pietro, Universita' di Roma Tre, Italy
Shlomi Dolev, Ben-Gurion University of the Negev, Israel
Robin Doss, Deakin University, Australia
Nicola Dragoni, Technical University of Denmark (DTU), Denmark
Falko Dressler, University of Erlangen, Germany
Robert Erbacher, Utah State University, United States
Eduardo B. Fernandez, Florida Atlantic University, United States
Simone Fischer-Hübner, Karlstad University, Sweden
Mario Freire, University of Beira Interior, Portugal
Mariagrazia Fugini, Politecnico Di Milano, Italy
Steven Furnell, University of Plymouth, United Kingdom
Juan Gonzalez Nieto, Queensland University of Technology, Australia
Carlos Goulart, Universidade Federal de Viçosa, Brazil
Lisandro Granville, Federal University of Rio Grande Do Sul, Brazil
Rüdiger Grimm, University Koblenz-Landau, Germany
Stefanos Gritzalis, University of the Aegean, Greece
Vic Grout, Glyndwr University, North Wales, United Kingdom
Drew Hamilton, Auburn University, United States
Amir Herzberg, Bar Ilan University, Israel
Alejandro Hevia, Universidad de Chile, Chile
Jiankun Hu, RMIT University, Australia
Jinpeng Huai, Beihang University, China
Min-Shiang Hwang, National Chung Hsing University, Taiwan
Cynthia Irvine, Naval Postgraduate School, United States
Markus Jakobsson, PARC, United States
Christian Damsgaard Jensen, Technical University of Denmark, Denmark
Hai Jiang, Arkansas State University, United States
Willem Jonker, Philips Research Nederland, Netherlands
Rocky K. C. Chang, The Hong Kong Polytechnic University, Hong Kong
Rajgopal Kannan, Louisiana State University, United States
Dong Seong Kim, Duke University, United States
Kwangjo Kim, Icu, Korea, Republic of
Seungjoo Kim, Sungkyunkwan University, Korea, Republic of
Cetin Kaya Koc, University of California, United States
Michael Kounavis, Intel Corporation, United States
Evangelos Kranakis, Carleton University, Canada
Ralf Kuesters, University of Trier, Germany
Chi-Sung Laih, National Cheng Kung University, Taiwan
Chin-Laung Lei, National Taiwan University, Taiwan
Albert Levi, Sabanci University, Turkey
Zhuowei Li, Microsoft, United States
Shiguo Lian, France Telecom R&D (Orange Labs) Beijing, China
Antonio Lioy, Politecnico Di Torino, Italy
Jorge E. López de Vergara, Universidad Autónoma de Madrid, Spain
Olivier Ly, Université Bordeaux 1, France
Manu Malek, Stevens Institute of Technology, United States
Khamish Malhotra, University of Glamorgan, United Kingdom
Yoshifumi Manabe, NTT Communication Science Laboratories, Japan
Olivier Markowitch, Université Libre De Bruxelles, Belgium
Gianluigi Me, Università Degli Studi Di Roma "tor Vergata", Italy
Natarajan Meghanathan, Jackson State University, United States
Ali Miri, University of Ottawa, Canada
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Mohamed Mosbah, University of Bordeaux, France
Haralambos Mouratidis, University of East London, United Kingdom
Yi Mu, University of Wollongong, Australia
James Muir, Cloakware Corporation, Canada
Volker Müller, University of Luxembourg, Luxembourg
Tatsuaki Okamoto, Ntt, Japan
José Luis Oliveira, Universidade De Aveiro, Portugal
Altair Olivo Santin, Pontifical Catholic University of Paraná, Brazil
Rolf Oppliger, Esecurity Technologies, Switzerland
Carles Padro, Universitat Politecnica De Catalunya, Spain
Daniel Page, University of Bristol, United Kingdom
Günther Pernul, University of Regensburg, Germany
Luiz Carlos Pessoa Albini, Federal University of Parana, Brazil
Marinella Petrocchi, National Research Council (CNR), Italy
Raphael C.-w. Phan, Loughborough University, United Kingdom
Krerk Piromsopa, Chulalongkorn University, Thailand
George Polyzos, AUEB, Greece
Joachim Posegga, Institute of IT Security and Security Law, Germany
Miodrag Potkonjak, University of California, Los Angeles, United States
Atul Prakash, University of Michigan, United States
Jean-jacques Quisquater, Ucl - Louvain, Belgium
Richard R. Brooks, Clemson University, United States
Indrajit Ray, Colorado State University, United States
Indrakshi Ray, Colorado State University, United States
Douglas Reeves, N.C. State University, United States
Peter Reiher, UCLA, United States
Rodrigo Roman, University of Malaga, Spain
Kouichi Sakurai, Kyushu University, Japan
David Samyde, Intel, United States
Aldri Santos, Federal University of Paraná, Brazil
Susana Sargento, Instituto De Telecomunicações - Universidade De Aveiro, Portugal
Damien Sauveron, Xlim -- University of Limoges, France
Erkay Savas, Sabanci University, Turkey
Bruno Schulze, LNCC - Laboratório Nacional de Computação Científica, Brazil
Jean-Marc Seigneur, University of Geneva, Switzerland
Dimitrios Serpanos, University of Patras, Greece
Alice Silverberg, University of California, Irvine, United States
Paulo Simoes, University of Coimbra, Portugal
Nicolas Sklavos, Technological Educational Institute of Patras, Greece
Haoyu Song, Bell Labs, United States
Paul Spirakis, University of Patras and RACTI, Greece
Mario Spremic, University of Zagreb, Faculty of Economics and Business, Croatia
Yannis Stamatiou, University of Ioannina, Greece
Aaron Striegel, University of Notre Dame, United States
Berk Sunar, Worcester Polytechnic Institute, United States
Willy Susilo, University of Wollongong, Australia
Tsuyoshi Takagi, Future University-hakodate, Japan
Kitt Tientanopajai, Khon Kaen University, Thailand
Ferucio Laurentiu Tiplea, "Al.I.Cuza" University of Iasi, Romania
Ambrosio Toval, University of Murcia, Spain
Ulrich Ultes-nitsche, University of Fribourg, Switzerland
Guillaume Urvoy-keller, Institut Eurecom, France
Luca Viganò, University of Verona, Italy
Haining Wang, The College of William and Mary, United States
Hua Wang, University of Southern Queensland, Australia
Huaxiong Wang, Macquarie University, Australia
Lingyu Wang, Concordia University, Canada
Duminda Wijesekera, George Mason University, United States
Yang Xiang, Central Queensland University, Australia
Chaoping Xing, Nanyang Technological University, Singapore
Mariemma I. Yagüe, Gisum Group, Spain
Wei Yan, Trend Micro, United States
Alec Yasinsac, University of South Alabama, United States
George Yee, National Research Council Canada, Canada
Sung-Ming Yen, National Central University, Taiwan
Seong-Moo Yoo, The University of Alabama in Huntsville, United States
Meng Yu, Western Illinois University, United States
Ting Yu, North Carolina State University, United States
Moti Yung, Google Inc. and Columbia University, United States
Nicola Zannone, Eindhoven University of Technology, Netherlands
Fangguo Zhang, Sun Yat-sen University, China, China
Zhongwei Zhang, University of Southern Queensland, Australia
Sheng Zhong,State University of New York at Buffalo, United States
Wanlei Zhou, Deakin University, Australia
Bin Zhu, Microsoft Research Asia, China
Deqing Zou, Huazhong University of Science&Technology, China
André Zúquete, IEETA / IT / Universidade de Aveiro, Portugal