Be ready for #SecITC2016 in:


SECITC 2016 post-proceedings will be published by Springer in LNCS. The post-proceedings of SECITC 2015 were published by Springer in LNCS 9522: “Innovative Security Solutions for Information Technology and Communications”:
ISBN 978-3-319-27179-8, DOI 10.1007/978-3-319-27179-8

The SecITC post-proceedings published in Springer LNCS

The full paper submission deadline is: April 15, 2016

Conference Sections:

Cryptographic Algorithms and Protocols

Security Technologies for IT&C

Information Security Management

Cyber Defense

Digital Forensics


Program Committee Chairs:

flag Ion BICA Military Technical Academy ROMANIA
flag Reza REYHANITABAR NEC Laboratories Europe GERMANY

Program Committee – Surname alphabetical order

flag Ludovic APVRILLE Institut Mines-Telecom / Telecom ParisTech FRANCE
flag Gildas AVOINE INSA Rennes FRANCE
flag Catalin BOJA Bucharest University of Economic Studies ROMANIA
flag Christophe CLAVIER Université de Limoges FRANCE
flag Paolo D’ARCO University of Salerno ITALY
flag Roberto DE PRISCO University of Salerno ITALY
flag Eric FREYSSINET Ministry of Interior / Cyberthreats delegation FRANCE
flag Helena HANDSCHUH Rambus – Cryptography Research USA
flag Shoichi HIROSE University of Fukui JAPAN
flag Xinyi HUANG Fujian Normal University CHINA
flag Miroslaw KUTYLOWSKI Wroclaw University of Technology POLAND
flag Kazuhiko MINEMATSU NEC Corporation JAPAN
flag Yi MU University of Wollongong AUSTRALIA
flag Udaya PARAMPALLI The University of Melbourne AUSTRALIA
flag Victor Valeriu PATRICIU Military Technical Academy ROMANIA
flag Josef PIEPRZYK Queensland University of Technology, Brisbrane AUSTRALIA
flag Pierangela SAMARATI Università degli Studi di Milano ITALY
flag Damien SAUVERON University of Limoges FRANCE
flag Emil SIMION ITA – Advanced Technologies Institute and University “Politehnica” from Bucharest ROMANIA
flag Agusti SOLANAS Smart Health Research Group, Rovira i Virgili University SPAIN
flag Rainer STEINWANDT Florida Atlantic University USA
flag Cristian TOMA Bucharest University of Economic Studies ROMANIA
flag Denis TRCEK University of Ljubljana SLOVENIA
flag Michael TUNSTALL Rambus – Cryptography Research USA
flag Qianhong WU Beihang University CHINA
flag Kan YASUDA NTT Corporation Research Laboratory, NTT JAPAN
flag Lei ZHANG East China Normal University CHINA

International Advisory Board – Surname alphabetical order

flag Vincent CHARVILLAT Université de Toulouse FRANCE
flag Ovidiu DAESCU The University of Texas at Dallas U.S.A
flag Philippe DHAUSSY ENSTA-Bretagne, Brest FRANCE
flag Traian MUNTEAN Université de la Méditerranée, Marseille FRANCE
flag Pavel POLECHTCHOUK Ingenico Company Australia
flag Vincent RIJMEN K.U. Leuven BELGIUM
flag Florentin SMARANDACHE University of New Mexico U.S.A
flag Jacques STERN École Normale Supérieure, Paris FRANCE
flag Bhavani THURAISINGHAM The University of Texas at Dallas / Cyber Security Research and Education Center – CySREC U.S.A
flag Ian TAYLOR Cardiff School of Computer Science and Informatics/Consultant @ Naval Research Laboratory in Washington DC, USA UK
flag Nicolae TAPUS University “Politehnica” from Bucharest ROMANIA
flag Bogdan WARINSCHI University of Bristol UK

Organization Committee and Technical Support Team

  • Mihai DOINEA – Bucharest University of Economic Studies, ROMANIA
  • Cristian CIUREA – Bucharest University of Economic Studies, ROMANIA
  • Luciana MOROGAN – Military Technical Academy, ROMANIA
  • Andrei-George OPRINA – Advanced Technologies Institute, ROMANIA
  • Marius POPA – Bucharest University of Economic Studies, ROMANIA
  • Mihai PURA – Military Technical Academy, ROMANIA
  • Mihai TOGAN – Military Technical Academy, ROMANIA

Call for papers:

The 9th International Conference on Security for Information Technology and Communications (SECITC’16) will be held in Bucharest, Romania on 9-10 June 2016. The conference venue will be the National Military Center / Aula Magna – Bucharest University of Economic Studies, a very central place at Universitatii / Romana Square of Bucharest city.

SECITC brings together computer security researchers, cryptographers, industry representatives and graduate students interested in any aspect of information security and privacy. One of SECITC’s primary goals is to bring together security and privacy researchers and professionals from different communities and provide a forum allowing the informal exchanges necessary for the emergence of new scientific and industrial collaborations. SECITC 2015 post-proceedings was published by Springer as LNCS vol. 9522 in a book titled “Innovative Security Solutions for Information Technology and Communications”. Paper submission and refereeing for SECITC 2016 will take place via EasyChair and the post-proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.

One originality of SECITC is its Exploits Session. In this session, new exploit authors will be invited to explain how exploits were discovered and submit a formal research paper describing their discoveries. While the discovery of new exploits is a high-risk high-gain investment that requires creativity and tenacious work, exploits are usually difficult to publish in mainstream research conferences. Exploit paper acceptance criteria will be the exploit’s nature, novelty and impact.

The conference topics comprise all aspects of information security, including but not limited to the following areas:
Access control, Algorithmic tools for security and cryptography, All aspects of cryptography, Application security, Attacks and defences, Authentication biometry, Censorship and censorship-resistance, Cloud Security, Distributed systems security, Embedded systems security, Digital forensics, Hardware security, Information flow analysis, Internet of Things (IoT) Security, Intrusion detection, Language-based security, Malware, Mobile security and privacy, Network security, New exploits, Policy enforcements, Privacy and anonymity, Protocol security, Reverse-engineering and code obfuscation, Security architectures, Security aspects of alternative currencies, Side channel attacks, Surveillance and anti-surveillance, System security.

Instructions for authors:

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other journal, conference/workshop with proceedings. The submission should begin with a title followed by a short abstract and keywords. Submissions must be in PDF format and should have at most 12 pages excluding the bibliography and appendices, and at most 20 pages in total, using at least 11-point fonts and with reasonable margins. All submissions must be anonymous. The reviewers are not required to read appendices—the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers should guarantee that at least one of the authors will attend the conference and present their paper.
Paper submission and review process is handled via EasyChair platform. All submissions must be in PDF format. For paper submission follow the following link:

As the final accepted papers will be published in LNCS by Springer, it is recommended that the submissions be processed in LaTeX2e according to the instructions listed on the Springer’s LNCS Webpage: These instructions are mandatory for the final papers.
In particular, Springer’s LNCS paper formatting requirements can be found at:


Important deadlines:

Full Paper Submission: April 15, 2016 at 23:59 UTC/GMT March 4, 2016 at 23:59 UTC/GMT

Notification of decision: May 16, 2016

Proceedings version due: May 25, 2016

Conference: June 9-10, 2016


It will be published soon



  • The conference registration fee is 300 € (EURO) for non-students.
  • The conference promotes results obtained by young researchers (undergraduate, graduate, master students, and Ph.D. students) by providing free participation opportunities, but the publishing and operational costs are covered by a fee of 150 € (EURO). Young researchers must provide proof of their university enrolment and must present results obtained individually or with other fellow students.


  • Payment can be done only by bank transfer.
  • The bank accounts (IBAN) are:

    • For ROL (Romanian currency), Transilvania Bank: RO21 BTRL RONC RT00 G606 7701
    • For EUR (European currency), Transilvania Bank: RO06 BTRL EURC RT00 G606 7701
    • BENEFICIARY DETAILS: “Asociatia Clubul Informaticii Economice – Cyber Knowledge Club” Non-Profit Associtation, Fiscal Registration Code (CIF) / Unique Registration Code (CUI): 31079668, Social Address: Bld. Mărăşeşti 19/4, District 4, Bucharest, with postal address: str. Calea Dorobantilor no. 15-17, “Virgil Madgearu” Building, room 2210 / 2315, District 1, Bucharest, web:
  • Authors are requested to send to the Conference e-email ( and the bank transfer confirmation document in order to validate the payment. Until the secretariat receives the document, the registration is considered incomplete.
  • Authors must pay the international transfer fee requested by the bank.

Registration benefits

  • Access to all conference sessions, keynote lectures, coffee breaks, certificate of attendance, other documentation, conference bag / conference folder.
  • Paper publication in the Springer’s LNCS or Conference Proceedings volume (hard copy) with ISBN / ISSN number. A single copy of the proceedings will be given to the registered author.
  • Publication of the paper in the on-line archive of all SECITC events.
  • Authors of the papers will receive an invitation to submit a version of their work to the on-line journal, JMEDS
  • Authors of the papers which contains quantitative security tests will receive an invitation to submit a version of their work to the on-line journal, JAQM.

Important notes

  • There will be no refunds for cancellations received after the registration date.
  • If the payment is made by cheque, the authors must support the extra fee for bank handling costs.