Home

SECITC 2015

Conference Proceedings published in Springer’s Lecture Notes in Computer Science:

  

The online platform for the paper processing is EasyChair:
https://easychair.org/conferences/?conf=secitc2015
The recommended free cross-platform LaTeX editor:
http://www.xm1math.net/texmaker/
The full paper submission deadline is: March 30th, 2015 (Old deadline: March 1st and March 20th, 2015)


Conference Committees:

We are proud to have in the conference’s committees, personalities from: Australia, Belgium, Brazil, Canada, China, France, Greece, India, Italy, Japan, Luxembourg, Romania, Singapore, Switzerland, UK, U.S.A. For the complete list, please visit our Commitees web page.

Keynote speakers (listed alphabetically):

1. Konstantinos MARKANTONAKIS: Secure Application Execution on Cyber Physical Devices


Dr. Konstantinos Markantonakis B.Sc., M.Sc., Ph.D, MBA. He is currently a Reader (Associate Professor) in the Information Security Group in Royal Holloway University of London.
His main research interests include smart card security and applications, secure cryptographic protocol design, Public Key Infrastructures (PKI) and key management, embedded system security, mobile phone operating systems/platform security, NFC/RFID security, grouping proofs, electronic voting protocols.
He has published more than 120 papers in international conferences and journals. He has worked as a Multi-application smart card Manager in VISA International EU. He was working as a Senior Information Security Consultant for Steer Davies Gleave. He is a member of the IFIP Working Group 8.8 on Smart Cards. Since June 2014, he is vice chair of IFIP WG 11.2 Pervasive Systems Security. He continues to act as a consultant on a variety of topics including smart card security, key management, information security protocols, mobile devices, smart card migration program planning/project management for financial institutions, transport operators and technology integrators.
2. Reza REYHANITABAR: Authenticated-Encryption: Security Notions, Designs and Applications


Reza Reyhanitabar is a senior researcher in the Security and Cryptography Laboratory at École Polytechnique Fédérale de Lausanne (EPFL), Switzerland. He works on cryptography and communications security and has over 10 years of experience in both academia and industry. Before joining EPFL in 2013, he was a visiting research fellow at the Computer Security and Industrial Cryptography (COSIC) group of KU Leuven in Belgium, and a research fellow and lecturer at University of Wollongong (UOW) in Australia, where he also received his PhD in Computer Science (Cryptography) in 2010. From 2002 until 2006 he was a security engineer in the R&D department of ZAEIM Electronic Industries Co., and a research engineer in the Electronic Research Centre at Sharif University of Technology, Iran.
He has served as the program co-chair of the Provable Security 2013 conference, and program committee member of several international conferences on cryptography and security (CANS 2015, SECITC 2015, ACNS 2014, ACISP 2014, ProvSec 2014, ProvSec 2012). He is a member of International Association for Cryptologic Research (IACR) since 2005, and a senior member of IEEE and Australian Computer Society.
3. Ferucio Laurentiu TIPLEA: New Results on Identity-based Encryption from Quadratic Residuosity


Dr. Ferucio Laurentiu Tiplea received his M.Sc. and Ph.D. degrees from the “Al.I.Cuza” University of Iasi in 1986 and 1993, respectively (Education). From 1990 to 1991 he was with the Mathemnatics Faculty of the “Al.I.Cuza” University of Iasi; he joined the Faculty of Computer Science in the Fall of 1991 (Positions). His research interests includes Petri nets, formal languages and automata, computability and complexity, codes and cryptography.
The papers list is listed in the conference program section.
The conference committee members are available here.

Workshop on Cryptography and Information Security (WCIS) – Kick-off meeting

Besides the SECITC 2015 conference event, it will take place a kick-off meeting which aims at creating a platform of discussions about the necessity for a professional network of the Romanian researchers in cryptography and information security.

Media Partner:

agora
Conference sections:

  • Cryptographic Algorithms and Protocols
  • Security Technologies for IT&C
  • Information Security Management
  • Cyber Defense
  • Digital Forensic

Conference papers:

  • Springer’s Lecture Notes in Computer Science will publish the SECITC 2015 accepted papers as a post-proceedings, after the meeting presentations feed-backs incorporated within the final re-revised papers.
  • Best papers that are not accepted to Springer’s LNCS, will be published in the ISSN proceedings volume with authors acceptance.
  • In order to have the conference proceedings published in Springer’s LNCS, Lecture Notes in Computer Science, must be accomplished the following rules:
    • The submission must be anonymous with no author names, affiliations or obvious references.
    • The length of the submission must be at most 12 pages excluding references and appendices. The text should be in a single column format, in at least 11-point fonts and have reasonable margins. If the submission is accepted, the length of the final version for Springer’s LNCS will be at most 20 pages including references and appendices.
    • The submission should begin with a title, a short abstract, and a list of keywords. The introduction should summarize the contributions of the paper at the level understandable for a non-expert reader. The reviewers are not required to read appendices—the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits.
    • Submissions must not substantially duplicate work that any of the authors has published in a journal or a conference/workshop with proceedings, or has submitted/is planning to submit before the author notification deadline to a journal or other conferences/workshops that have proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. SECITC reserves the right to share information about submissions with other program committees to detect parallel submissions.
    • Program committee members are restricted to one submission each. Exceptions to this rule can be arranged for submissions co-authored with students so as not to block publishing by PhD candidates.
    • It is encouraged that the submission be processed according to the instructions listed on Springer’s web site. These instructions are mandatory for the final papers. Submitted papers must be in PDF format and should be submitted electronically. A detailed description of the electronic submission procedure will be announced at the conference homepage.
    • Full paper submission is on 1st March 2015.
    • Notification of acceptance or rejection will be sent to authors by 20th March 2015.
    • Authors guarantee that their paper will be presented at the conference. The final versions of the accepted papers will be due on 31th March 2015.
    • The conference starts on 11-th June 2015.

Latest News

JMEDS supports SECITC

JMEDS The Journal of Mobile, Embedded and Distributed Systems (JMEDS) is an open access peer reviewed and indexed international journal that publishes the latest results of researches and developed solutions in the field of mobile, embedded and distributed systems. The journal offers to engineers, software developers, mathematicians and scientists, the possibilities:

  • to present original ideas and research results;
  • to establish new collaborations within current and future research projects;
  • to establish academic collaborations;
  • to link the university research with the industry.
  1. SECITC 2013 – first announcement Leave a reply
  2. SECITC 2012 Conference Program Comments Off
  3. SECITC 2012 on ACM events list Leave a reply
  4. SECITC 2012 on allconferences.com Leave a reply
  5. JAQM joins SECITC 2012 Leave a reply
  6. JMEDS joins SECITC 2012 Leave a reply
  7. SECITC 2012 first announcement Leave a reply