Be ready for #SecITC2016 in:


SECITC 2016 post-proceedings will be published by Springer in LNCS. The post-proceedings of SECITC 2015 were published by Springer in LNCS 9522: “Innovative Security Solutions for Information Technology and Communications”:
ISBN 978-3-319-27179-8, DOI 10.1007/978-3-319-27179-8

The SecITC post-proceedings published in Springer LNCS

The full paper submission deadline is: April 15, 2016

Conference Sections:

Cryptographic Algorithms and Protocols

Security Technologies for IT&C

Information Security Management

Cyber Defense

Digital Forensics


Program Committee Chairs:

flag Ion BICA Military Technical Academy ROMANIA
flag Reza REYHANITABAR NEC Laboratories Europe GERMANY

Program Committee – Surname alphabetical order

flag Ludovic APVRILLE Institut Mines-Telecom / Telecom ParisTech FRANCE
flag Gildas AVOINE INSA Rennes FRANCE
flag Catalin BOJA Bucharest University of Economic Studies ROMANIA
flag Christophe CLAVIER Université de Limoges FRANCE
flag Paolo D’ARCO University of Salerno ITALY
flag Roberto DE PRISCO University of Salerno ITALY
flag Eric FREYSSINET Ministry of Interior / Cyberthreats delegation FRANCE
flag Helena HANDSCHUH Rambus – Cryptography Research USA
flag Shoichi HIROSE University of Fukui JAPAN
flag Xinyi HUANG Fujian Normal University CHINA
flag Miroslaw KUTYLOWSKI Wroclaw University of Technology POLAND
flag Kazuhiko MINEMATSU NEC Corporation JAPAN
flag Yi MU University of Wollongong AUSTRALIA
flag Udaya PARAMPALLI The University of Melbourne AUSTRALIA
flag Victor Valeriu PATRICIU Military Technical Academy ROMANIA
flag Josef PIEPRZYK Queensland University of Technology, Brisbrane AUSTRALIA
flag Pierangela SAMARATI Università degli Studi di Milano ITALY
flag Damien SAUVERON University of Limoges FRANCE
flag Emil SIMION ITA – Advanced Technologies Institute and University “Politehnica” from Bucharest ROMANIA
flag Agusti SOLANAS Smart Health Research Group, Rovira i Virgili University SPAIN
flag Rainer STEINWANDT Florida Atlantic University USA
flag Cristian TOMA Bucharest University of Economic Studies ROMANIA
flag Denis TRCEK University of Ljubljana SLOVENIA
flag Michael TUNSTALL Rambus – Cryptography Research USA
flag Qianhong WU Beihang University CHINA
flag Kan YASUDA NTT Corporation Research Laboratory, NTT JAPAN
flag Lei ZHANG East China Normal University CHINA

International Advisory Board – Surname alphabetical order

flag Vincent CHARVILLAT Université de Toulouse FRANCE
flag Ovidiu DAESCU The University of Texas at Dallas U.S.A
flag Philippe DHAUSSY ENSTA-Bretagne, Brest FRANCE
flag Traian MUNTEAN Université de la Méditerranée, Marseille FRANCE
flag Pavel POLECHTCHOUK Ingenico Company Australia
flag Vincent RIJMEN K.U. Leuven BELGIUM
flag Florentin SMARANDACHE University of New Mexico U.S.A
flag Jacques STERN École Normale Supérieure, Paris FRANCE
flag Bhavani THURAISINGHAM The University of Texas at Dallas / Cyber Security Research and Education Center – CySREC U.S.A
flag Ian TAYLOR Cardiff School of Computer Science and Informatics/Consultant @ Naval Research Laboratory in Washington DC, USA UK
flag Nicolae TAPUS University “Politehnica” from Bucharest ROMANIA
flag Bogdan WARINSCHI University of Bristol UK

Organization Committee and Technical Support Team

  • Mihai DOINEA – Bucharest University of Economic Studies, ROMANIA
  • Cristian CIUREA – Bucharest University of Economic Studies, ROMANIA
  • Luciana MOROGAN – Military Technical Academy, ROMANIA
  • Andrei-George OPRINA – Advanced Technologies Institute, ROMANIA
  • Marius POPA – Bucharest University of Economic Studies, ROMANIA
  • Mihai PURA – Military Technical Academy, ROMANIA
  • Mihai TOGAN – Military Technical Academy, ROMANIA

Call for papers:

SECITC brings together computer security researchers, cryptographers, industry representatives and graduate students interested in any aspect of information security and privacy. One of SECITC’s primary goals is to bring together security and privacy researchers and professionals from different communities and provide a forum allowing the informal exchanges necessary for the emergence of new scientific and industrial collaborations. SECITC 2015 post-proceedings was published by Springer as LNCS vol. 9522 in a book titled “Innovative Security Solutions for Information Technology and Communications”. Paper submission and refereeing for SECITC 2016 will take place via EasyChair and the post-proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.

One originality of SECITC is its Exploits Session. In this session, new exploit authors will be invited to explain how exploits were discovered and submit a formal research paper describing their discoveries. While the discovery of new exploits is a high-risk high-gain investment that requires creativity and tenacious work, exploits are usually difficult to publish in mainstream research conferences. Exploit paper acceptance criteria will be the exploit’s nature, novelty and impact.

The conference topics comprise all aspects of information security, including but not limited to the following areas:
Access control, Algorithmic tools for security and cryptography, All aspects of cryptography, Application security, Attacks and defences, Authentication biometry, Censorship and censorship-resistance, Cloud Security, Distributed systems security, Embedded systems security, Digital forensics, Hardware security, Information flow analysis, Internet of Things (IoT) Security, Intrusion detection, Language-based security, Malware, Mobile security and privacy, Network security, New exploits, Policy enforcements, Privacy and anonymity, Protocol security, Reverse-engineering and code obfuscation, Security architectures, Security aspects of alternative currencies, Side channel attacks, Surveillance and anti-surveillance, System security.

Instructions for authors:

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other journal, conference/workshop with proceedings. The submission should begin with a title followed by a short abstract and keywords. Submissions must be in PDF format and should have at most 12 pages excluding the bibliography and appendices, and at most 20 pages in total, using at least 11-point fonts and with reasonable margins. All submissions must be anonymous. The reviewers are not required to read appendices—the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers should guarantee that at least one of the authors will attend the conference and present their paper.
Paper submission and review process is handled via EasyChair platform. All submissions must be in PDF format. For paper submission follow the following link:

As the final accepted papers will be published in LNCS by Springer, it is recommended that the submissions be processed in LaTeX2e according to the instructions listed on the Springer’s LNCS Webpage: These instructions are mandatory for the final papers.
In particular, Springer’s LNCS paper formatting requirements can be found at:


Important deadlines:

Full Paper Submission: April 15, 2016 at 23:59 UTC/GMT March 4, 2016 at 23:59 UTC/GMT

Notification of decision: May 16, 2016

Proceedings version due: May 25, 2016

Conference: June 9-10, 2016


The conference program is available for download here.


CCA Serge Vaudenay entered at the Ecole Normale Supérieure in Paris in 1989 with a major in mathematics. He received his PhD in computer sciences from University of Paris 7 – Denis Diderot in 1995. He subsequently became a research fellow at CNRS (National Center for Scientific Research in France). In 1999, he was appointed as a Professor at the EPFL, where he created the Security and Cryptography Laboratory.
He works on cryptography and the security of digital information. Most of his work relates to security analysis and provable security of cryptographic algorithms and protocols, specially in symmetric cryptography, post-quantum public-key cryptography, RFID protocols and distance bounding. He wrote an Essay on cryptography (in French, published by PPUR) and a textbook on cryptography (published by Springer). He was program chair of several research conferences and workshops: ACNS’14, INDOCRYPT’13, AFRICACRYPT’12, SAC’11, AFRICACRYPT’08, EUROCRYPT’06, MYCRYPT’05, PKC’05, SAC’01, and FSE’98. In 2007-12, he was an elected director of the IACR (International Association for Cryptologic Research).
CCA Jean-Louis Lanet leads the High Security Labs of INRIA in Rennes. He was a full Professor in the Computer Science Department at University of Limoges from 2007. He is also the team leader of SSD (Smart Secure Device) research group. Prior to that, he was a senior researcher at Gemplus Research Labs (1996-2007). During this period he spent two years at INRIA (Sophia-Antipolis) (2003-2005) as an engineer at DirDRI (Direction des Relations Industrielles) and as a senior research associate in the Everest team. He started his career as a researcher at Elecma, Electronic division of the Snecma, now a part of the Safran group (1984-1995) and his field of research was on jet engine control. His current research interests include security of small systems like smart cards and software engineering.
CCA Paolo D’Arco received in 2002 a PhD in Computer Science, from the University of Salerno (Italy). From November 2001 to October 2002, he was a post-doctoral fellow at the Centre for Applied Cryptographic Research (CACR), in the Department of Combinatorics and Optimization (University of Waterloo). Since March 2015 he is Associate Professor at the Computer Science Department of the University of Salerno (Italy). His main research interests are cryptography, algorithms and data security.
He has worked on the design and the analysis of unconditionally secure cryptographic primitives and protocols, (e.g., secret sharing schemes, key distribution, distributed oblivious transfer, private information retrieval from a database) and on some computationally secure schemes (e.g., robust and distributed broadcast schemes, anonymous communication schemes, RFID authentication). He has also done some cryptanalysis of new protocols. Currently, he is interested in efficient protocols for secure multi-party computation.
Since 2005 he has been member of several program committees of international conferences and he has published many papers in international journals and in the proceedings of conferences in theoretical computer science, cryptography and data security.
CCA Ferucio Laurentiu Tiplea received the Ph.D. degree in computer science from “Alexandru Ioan Cuza” University of Iasi, Romania, in 1993. He joined the Department of Computer Science of the aforementioned university in 1990, where he is currently Professor of Computer Science. Dr. Tiplea’s research interests lie in the area of theories and tools for high-level modeling, design, and analysis of systems, computability and complexity, and cryptography and computer security. He published more than 80 papers in professional journals and refereed conference proceedings in these areas, co-edited five conference volumes, contributed to six edited volumes, and delivered invited talks at many universities and international conferences. Dr. Tiplea was the recipient of several fellowships, such as the Fulbright Fellowship, German Academy Fellowship, DAAD Fellowship, Monbusho Fellowship. From December 2003 to May 2006 he held a Visiting Professor position at University of Central Florida, School of Computer Science, Orlando (USA).



  • The conference registration fee is 300 € (EURO) for non-students.
  • The conference promotes results obtained by young researchers (undergraduate, graduate, master students, and Ph.D. students) by providing free participation opportunities, but the publishing and operational costs are covered by a fee of 150 € (EURO). Young researchers must provide proof of their university enrolment and must present results obtained individually or with other fellow students.


  • Payment can be done only by bank transfer.
  • The bank accounts (IBAN) are:

    • For ROL (Romanian currency), Transilvania Bank: RO21 BTRL RONC RT00 G606 7701
    • For EUR (European currency), Transilvania Bank: RO06 BTRL EURC RT00 G606 7701
    • The SWIFT code of Transilvania Bank is: BTRLRO22
    • BENEFICIARY DETAILS: “Asociatia Clubul Informaticii Economice – Cyber Knowledge Club” Non-Profit Associtation, Fiscal Registration Code (CIF) / Unique Registration Code (CUI): 31079668, Social Address: Bld. Mărăşeşti 19/4, District 4, Bucharest, with postal address: str. Calea Dorobantilor no. 15-17, “Virgil Madgearu” Building, room 2210 / 2315, District 1, Bucharest, web:
  • Authors are requested to send to the Conference e-email ( and the bank transfer confirmation document in order to validate the payment. Until the secretariat receives the document, the registration is considered incomplete.
  • Authors must pay the international transfer fee requested by the bank.

Registration benefits

  • Paper publication in the Springer’s LNCS or Conference Proceedings volume with ISBN / ISSN number.
  • Access to all conference sessions, keynote lectures, coffee breaks, certificate of attendance, other documentation, conference bag / conference folder.
  • Authors of the papers will receive an invitation to submit a version of their work to the on-line journal, JMEDS
  • Authors of the papers which contains quantitative security tests will receive an invitation to submit a version of their work to the on-line journal, JAQM.

Important notes

  • There will be no refunds for cancellations received after the registration date.
  • If the payment is made by cheque, the authors must support the extra fee for bank handling costs.


SECITC 2016 will take place at the National Military Palace in the heart of Bucharest, the capital of Romania.
The address is:
The National Military Palace
Constantin Mille 1, Sector 1,
Bucharest, Romania
Tel: + 40 21 314 95 51
Fax: + 40 21 315 09 60
The meeting site is in the city center, close to “Universitatii” Square Subway Station – please see the map. Use the main entrance on the left side of the National Military Palace and take the elevators to the third floor. Follow the signs to reach the conference.


All the details about the location of the conference (National Military Palace), travel-accomodation and Bucharest city can be downloaded from HERE.