Dear Cyber Security community please be prepared for SecITC2019 soon.
For free one month online access of the Springer LNCS volume 11359 with title: “Innovative Security Solutions for Information Technology and Communications” of the SecITC 2018, in March 2019, please click on the following link:

The SecITC post-proceedings published in Springer LNCS

SECITC 2018 post-proceedings are targeting to be published by Springer in LNCS, in volume number 11359.

The post-proceedings of SECITC 2017 were published by Springer in LNCS 10543: “Innovative Security Solutions for Information Technology and Communications”, 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. | – Soft Cover ISBN: 978-3-319-69283-8 / e-Book ISBN: 978-3-319-69284-5, DOI 10.1007/978-3-319-69284-5. The post-proceedings of SECITC 2016 were published by Springer in LNCS 10006: “Innovative Security Solutions for Information Technology and Communications”, 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers. | – Soft Cover:ISBN 978-3-319-47237-9 / e-Book ISBN: 978-3-319-47238-6, DOI 10.1007/978-3-319-47238-6. The post-proceedings of SECITC 2015 were published by Springer in LNCS 9522: “Innovative Security Solutions for Information Technology and Communications”, 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers | – Soft Cover ISBN: 978-3-319-27178-1 / e-Book ISBN: 978-3-319-27179-8, DOI 10.1007/978-3-319-27179-8.

The full paper submission deadline is: September 17, 2018 October 2nd, 2018

Conference Sections:

Security Technologies for ICT

Cryptographic Algorithms and Protocols

Information Security Management

Conference Chairs:

flag Cristian TOMA ASE / USE – Bucharest University of Economic Studies ROMANIA

Program Committee – Surname alphabetical order

flag Ludovic APVRILLE Institut Mines-Telecom / Telecom ParisTech FRANCE
flag Lasse BERNTZEN The University College of Southeast Norway (USN) NORWAY
flag Ion BICA Military Technical Academy ROMANIA
flag Catalin BOJA Bucharest University of Economic Studies ROMANIA
flag Xiaofeng CHEN Xidian University CHINA
flag Christophe CLAVIER Université de Limoges FRANCE
flag Paolo D’ARCO University of Salerno ITALY
flag Roberto De Prisco Università degli Studi di Salerno ITALY
flag Eric DIEHL Sony Pictures USA
flag Eric FREYSSINET Ministry of Interior / Cyberthreats delegation FRANCE
flag Helena HANDSCHUH Rambus – Cryptography Research USA
flag Shoichi HIROSE University of Fukui JAPAN
flag Xinyi HUANG Fujian Normal University CHINA
flag Miroslaw KUTYLOWSKI Wroclaw University of Technology POLAND
flag Giovanni LIVRAGA Università degli Studi di Milano ITALY
flag Florian MENDEL TU Graz AUSTRIA
flag Kazuhiko MINEMATSU NEC Corporation JAPAN
flag Reza REYHANITABAR NEC Laboratories Europe GERMANY
flag Peter Y.A. RYAN University of Luxembourg LUXEMBOURG
flag Victor Valeriu PATRICIU Military Technical Academy ROMANIA
flag Calinel PASTEANU Oracle GERMANY
flag Emil SIMION ITA – Advanced Technologies Institute and University “Politehnica” from Bucharest ROMANIA
flag Agusti SOLANAS Smart Health Research Group, Rovira i Virgili University SPAIN
flag Rainer STEINWANDT Florida Atlantic University USA
flag Ferucio Laurentiu TIPLEA Alexandru Ioan Cuza University of Iasi ROMANIA
flag Mihai TOGAN Military Technical Academy ROMANIA
flag Valerie VIET TRIEM TONG CentraleSupelec FRANCE
flag Guilin WANG Huawei CHINA
flag Qianhong WU Beihang University CHINA
flag Sule YILDIRIM Norwegian University of Science and Technology (NTNU) NORWAY
flag Lei ZHANG East China Normal University CHINA

Technical Support Team

  • Mihai DOINEA – Bucharest University of Economic Studies, ROMANIA
  • Cristian CIUREA – Bucharest University of Economic Studies, ROMANIA
  • Luciana MOROGAN – Military Technical Academy, ROMANIA
  • Marius POPA – Bucharest University of Economic Studies, ROMANIA
  • Bogdan IANCU – Bucharest University of Economic Studies, ROMANIA
  • Mihai PURA – Military Technical Academy, ROMANIA
  • Marian HAIDUCU – IMAR – Institute of Mathematics of the Romanian Academy, ROMANIA
  • Diana MAIMUT – Advanced Technologies Institute, ROMANIA
  • George TESELEANU – Advanced Technologies Institute, ROMANIA

Call for papers:

SECITC brings together computer security researchers, cryptographers, industry representatives and graduate students interested in any aspect of information security and privacy. One of SECITC’s primary goals is to bring together security and privacy researchers and professionals from different communities and provide a forum allowing the informal exchanges necessary for the emergence of new scientific and industrial collaborations. Regarding the scientific papers dissemination, SECITC 2017 post-proceedings was published by Springer as LNCS vol. 10543, SECITC 2016 post-proceedings was published by Springer as LNCS vol. 10006 and for SECITC 2015 post-proceedings was published by Springer as LNCS vol. 9522 in a book titled “Innovative Security Solutions for Information Technology and Communications”. The paper submission and refereeing for SECITC 2018, will take place via EasyChair: and the post-proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series. In the year 2018, the board is targeting to have a stronger focus on the technologies from the Cyber Security field without impacting the Crypto focus.

The conference topics comprise all aspects of information security, including but not limited to the following areas:

  • Access control,
  • Cryptography, biometric and watermarking
  • Application security,
  • Attacks and defences,
  • Blockchain Security and Security aspects of alternative currencies,
  • Censorship and censorship-resistance,
  • Cloud and Web Security,
  • Distributed systems security,
  • Embedded systems security,
  • Digital forensics,
  • Hardware security,
  • Information flow analysis,
  • Internet of Things (IoT) Security,
  • Intrusion detection and prevention system,
  • Language-based security,
  • Malware and Ransomware,
  • Mobile security,
  • Network security,
  • New exploits,
  • Policy enforcements,
  • Privacy and anonymity,
  • Protocol security,
  • Reverse-engineering and code obfuscation,
  • Security architectures,
  • Side channel attacks,
  • Surveillance and anti-surveillance,
  • System security,
  • Trust management.

Instructions for authors:

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other journal, conference/workshop with proceedings. The submission should begin with a title followed by a short abstract and keywords. Submissions must be in PDF format and should have at most 12 pages excluding the bibliography and appendices, and at most 20 pages in total, using at least 11-point fonts and with reasonable margins. All submissions must be anonymous. The reviewers are not required to read appendices—the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers should guarantee that at least one of the authors will attend the conference and present their paper. Paper submission and review process is handled via EasyChair platform. All submissions must be in PDF format. For paper submission follow the following link:

As the final accepted papers will be published in LNCS by Springer, it is recommended that the submissions be processed in LaTeX2e according to the instructions listed on the Springer’s LNCS Webpage: These instructions are mandatory for the final papers. In particular, Springer’s LNCS paper formatting requirements can be found at:


Important deadlines:
Full Paper Submission: September 17, 2018 October 2nd, 2018, at 23:59 UTC/GMT
Notification of decision: October 16, 2018
Proceedings version due: October 22, 2018
Conference: November 8-9, 2018


The conference program is available now for download.
Hackathon problem description for the students can be download from here.


Paolo D’Arco

Bio: Paolo D’Arco was born in Salerno (Italy) on July 7, 1972. He received a Master degree (with honors) in Computer Science in May 1997, and a PhD in Computer Science in February 2002, both from the University of Salerno. During the PhD program he attended a few schools for PhD students on algorithms and cryptography: he was visiting researcher for a semester at the University of Waterloo, in Ontario, (Canada). He also had two short-term visits at the University of Catalunya (Spain), and at Telcordia Technologies – DIMACS- (USA). From November 2001 to October 2002, he was a post-doctoral fellow at the Centre for Applied Cryptographic Research (CACR), in the Department of Combinatorics and Optimization (University of Waterloo), under the supervision of professor Douglas Stinson. In 2003 he won a competition for a permanent position as assistant professor at the University of Salerno. In 2014 he received the national scientific qualification (the Italian ASN) as associate professor in two academic areas: Computer Science (cod. 01/B1) and Engineering (cod. 09/H1). Since March 2015, he is associate professor at the Dipartimento di Informatica. His main research interests are cryptography, algorithms and data security. He has worked on the design and the analysis of unconditionally secure (e.g., secret sharing schemes, key distribution, oblivious transfer, private information retrieval from a database) and on some computationally secure (e.g., robust and distributed broadcast schemes, anonymous communication, RFID authentication) cryptographic primitives and protocols. He has also done some crypto-analysis of lightweight protocols. Currently, he is interested in efficient and user-friendly protocols for secure multi-party computation.

Title of the presentation: “Ultra-lightweight authentication protocols”

Jean-François LALANDE

Bio: Jean-François Lalande is Associate Professor in the CIDRE team (CentraleSupélec / Inria), in the IRISA laboratory. His research interests are access control policies, software security, and malware analysis for embedded systems. In the last years is has published papers about Android malware in TIFS, Malcon’15 and ’17, LASER’16. He has also participated to the Kharon project ( that uses information flows techniques for analyzing malware behaviours at runtime.

Title of the presentation: “Android Malware Analysis: from technical difficulties to scientific challenges”

Denis Jean-Michel BAHEUX

Bio: Denis Baheux had received a master degree in engineering and a master degree in computer science. In 2012 he graduated from École Supérieure d’Électricité (Supélec), a french engineering school (Grande École) with a selective recruiting process. Between 2012 and 2015 he worked for Supélec on state of the art Machine learning algorithms. Skilled in cryptanalysis and low-level software reversing, he integrated the data extraction unit of the IRCGN forensic laboratory in 2015. The Institut de Recherche Criminelle de la Gendarmerie Nationale (IRCGN) is the national forensic laboratory for the french Gendarmerie (law enforcement).

Title of the presentation: “Implications of applied cryptography for digital forensics investigations”

Emil Simion and Diana Maimut

Title of the presentation: “Post-Quantum Cryptography and a (Qu)Bit More”



  • The conference registration fee is 300 € (EURO) for non-students.
  • The conference promotes results obtained by young researchers (undergraduate, graduate, master students, and Ph.D. students) by providing free participation opportunities, but the publishing and operational costs are covered by a fee of 150 € (EURO). Young researchers must provide proof of their university enrollment and must present results obtained individually or with other fellow students.


  • Payment can be done only by bank transfer.
  • The bank accounts (IBAN) are:

    • For ROL (Romanian currency), Transilvania Bank: RO21 BTRL RONC RT00 G606 7701
    • For EUR (European currency), Transilvania Bank: RO06 BTRL EURC RT00 G606 7701
    • The SWIFT code of Transilvania Bank is: BTRLRO22
    • BENEFICIARY DETAILS: “Asociatia Clubul Informaticii Economice – Cyber Knowledge Club” Non-Profit Association, Fiscal Registration Code (CIF) / Unique Registration Code (CUI): 31079668, No. Reg. Comm.: J84/21.11.2012, Social Address: Bld. Mărăşeşti 19/4, District 4, Bucharest, with postal address: str. Calea Dorobantilor no. 15-17, “Virgil Madgearu” Building, room 2210 / 2315, District 1, Bucharest, web:
  • Authors are requested to send to the Conference e-mail ( and the bank transfer confirmation document in order to validate the payment. Until the secretariat receives the document, the registration is considered incomplete.
  • Authors must pay the international transfer fee requested by the bank.

Registration benefits

  • Paper publication in the Springer’s LNCS or Conference Proceedings volume with ISBN / ISSN number.
  • Access to all conference sessions, keynote lectures, coffee breaks, other documentation, conference bag / conference folder.
  • Authors of the papers will receive an invitation to submit a version of their work to a different on-line journal – e.g. IE, JMEDS or JAQM.

Important notes

  • There will be no refunds for cancellations received after the registration date.
  • If the payment is made by cheque, the authors must support the extra fee for bank handling costs.


SECITC 2018 will take place in the heart of Bucharest, the capital of Romania, at Bucharest University of Economic Studies – For the location please check out Google Maps: For the complete URL, please access this link. The Google map – embedded object:

For more information about the city and the location, please download the PDF format here. The GPS coordinates are – JSON object:

  • “DD”:{“lat”:44.44187,”lng”:26.09132}
  • “DMS”:{“lat”:”44º26’30.74″ N”,”lng”:”26º05’28.76″ E”}
  • “geohash”:”sxfscdrhev”
  • “UTM”:”35T 427690.4201981 4921353.94642746″

The QR code with the link to the Google Map is: Pictures with the location: