The 9th International Conference on Security for Information Technology and Communications (SecITC 2016) will be held in Bucharest, Romania on June 8-9th, 2016. The conference venue will be the Palace of the National Military Circle, located right in the heart of Bucharest, the capital city of Romania.
Program Committee Chairs:
|Ion BICA||Military Technical Academy||ROMANIA|
|Reza REYHANITABAR||NEC Laboratories Europe||GERMANY|
Program Committee – Surname alphabetical order
|Elena ANDREEVA||COSIC, KU Leuven||BELGIUM|
|Ludovic APVRILLE||Institut Mines-Telecom / Telecom ParisTech||FRANCE|
|Gildas AVOINE||INSA Rennes||FRANCE|
|Catalin BOJA||Bucharest University of Economic Studies||ROMANIA|
|Christophe CLAVIER||Université de Limoges||FRANCE|
|Paolo D’ARCO||University of Salerno||ITALY|
|Roberto DE PRISCO||University of Salerno||ITALY|
|Eric FREYSSINET||Ministry of Interior / Cyberthreats delegation||FRANCE|
|Helena HANDSCHUH||Rambus – Cryptography Research||USA|
|Shoichi HIROSE||University of Fukui||JAPAN|
|Xinyi HUANG||Fujian Normal University||CHINA|
|Miroslaw KUTYLOWSKI||Wroclaw University of Technology||POLAND|
|Bart MENNINK||COSIC, KU Leuven||BELGIUM|
|Kazuhiko MINEMATSU||NEC Corporation||JAPAN|
|Yi MU||University of Wollongong||AUSTRALIA|
|Udaya PARAMPALLI||The University of Melbourne||AUSTRALIA|
|Victor Valeriu PATRICIU||Military Technical Academy||ROMANIA|
|Josef PIEPRZYK||Queensland University of Technology, Brisbrane||AUSTRALIA|
|Pierangela SAMARATI||Università degli Studi di Milano||ITALY|
|Damien SAUVERON||University of Limoges||FRANCE|
|Emil SIMION||ITA – Advanced Technologies Institute and University “Politehnica” from Bucharest||ROMANIA|
|Agusti SOLANAS||Smart Health Research Group, Rovira i Virgili University||SPAIN|
|Rainer STEINWANDT||Florida Atlantic University||USA|
|Cristian TOMA||Bucharest University of Economic Studies||ROMANIA|
|Denis TRCEK||University of Ljubljana||SLOVENIA|
|Michael TUNSTALL||Rambus – Cryptography Research||USA|
|Qianhong WU||Beihang University||CHINA|
|Kan YASUDA||NTT Corporation Research Laboratory, NTT||JAPAN|
|Lei ZHANG||East China Normal University||CHINA|
International Advisory Board – Surname alphabetical order
|Vincent CHARVILLAT||Université de Toulouse||FRANCE|
|Ovidiu DAESCU||The University of Texas at Dallas||U.S.A|
|Philippe DHAUSSY||ENSTA-Bretagne, Brest||FRANCE|
|Traian MUNTEAN||Université de la Méditerranée, Marseille||FRANCE|
|Pavel POLECHTCHOUK||Ingenico Company||Australia|
|Vincent RIJMEN||K.U. Leuven||BELGIUM|
|Florentin SMARANDACHE||University of New Mexico||U.S.A|
|Jacques STERN||École Normale Supérieure, Paris||FRANCE|
|Bhavani THURAISINGHAM||The University of Texas at Dallas / Cyber Security Research and Education Center – CySREC||U.S.A|
|Ian TAYLOR||Cardiff School of Computer Science and Informatics/Consultant @ Naval Research Laboratory in Washington DC, USA||UK|
|Nicolae TAPUS||University “Politehnica” from Bucharest||ROMANIA|
|Bogdan WARINSCHI||University of Bristol||UK|
Organization Committee and Technical Support Team
- Mihai DOINEA – Bucharest University of Economic Studies, ROMANIA
- Cristian CIUREA – Bucharest University of Economic Studies, ROMANIA
- Luciana MOROGAN – Military Technical Academy, ROMANIA
- Andrei-George OPRINA – Advanced Technologies Institute, ROMANIA
- Marius POPA – Bucharest University of Economic Studies, ROMANIA
- Mihai PURA – Military Technical Academy, ROMANIA
- Mihai TOGAN – Military Technical Academy, ROMANIA
Call for papers:
SECITC brings together computer security researchers, cryptographers, industry representatives and graduate students interested in any aspect of information security and privacy. One of SECITC’s primary goals is to bring together security and privacy researchers and professionals from different communities and provide a forum allowing the informal exchanges necessary for the emergence of new scientific and industrial collaborations. SECITC 2015 post-proceedings was published by Springer as LNCS vol. 9522 in a book titled “Innovative Security Solutions for Information Technology and Communications”. Paper submission and refereeing for SECITC 2016 will take place via EasyChair and the post-proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.
One originality of SECITC is its Exploits Session. In this session, new exploit authors will be invited to explain how exploits were discovered and submit a formal research paper describing their discoveries. While the discovery of new exploits is a high-risk high-gain investment that requires creativity and tenacious work, exploits are usually difficult to publish in mainstream research conferences. Exploit paper acceptance criteria will be the exploit’s nature, novelty and impact.
The conference topics comprise all aspects of information security, including but not limited to the following areas:
Access control, Algorithmic tools for security and cryptography, All aspects of cryptography, Application security, Attacks and defences, Authentication biometry, Censorship and censorship-resistance, Cloud Security, Distributed systems security, Embedded systems security, Digital forensics, Hardware security, Information flow analysis, Internet of Things (IoT) Security, Intrusion detection, Language-based security, Malware, Mobile security and privacy, Network security, New exploits, Policy enforcements, Privacy and anonymity, Protocol security, Reverse-engineering and code obfuscation, Security architectures, Security aspects of alternative currencies, Side channel attacks, Surveillance and anti-surveillance, System security.
Instructions for authors:
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other journal, conference/workshop with proceedings. The submission should begin with a title followed by a short abstract and keywords. Submissions must be in PDF format and should have at most 12 pages excluding the bibliography and appendices, and at most 20 pages in total, using at least 11-point fonts and with reasonable margins. All submissions must be anonymous. The reviewers are not required to read appendices—the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers should guarantee that at least one of the authors will attend the conference and present their paper.
Paper submission and review process is handled via EasyChair platform. All submissions must be in PDF format. For paper submission follow the following link: https://easychair.org/conferences/?conf=secitc2016
As the final accepted papers will be published in LNCS by Springer, it is recommended that the submissions be processed in LaTeX2e according to the instructions listed on the Springer’s LNCS Webpage: www.springer.com/lncs. These instructions are mandatory for the final papers.
In particular, Springer’s LNCS paper formatting requirements can be found at:
|DEADLINES – PROGRAM:|
Full Paper Submission: April 15, 2016 at 23:59 UTC/GMT
March 4, 2016 at 23:59 UTC/GMT
Notification of decision: May 16, 2016
Proceedings version due: May 25, 2016
Conference: June 9-10, 2016
The conference program is available for download.
|Serge Vaudenay entered at the Ecole Normale Supérieure in Paris in 1989 with a major in mathematics. He received his PhD in computer sciences from University of Paris 7 – Denis Diderot in 1995. He subsequently became a research fellow at CNRS (National Center for Scientific Research in France). In 1999, he was appointed as a Professor at the EPFL, where he created the Security and Cryptography Laboratory.|
He works on cryptography and the security of digital information. Most of his work relates to security analysis and provable security of cryptographic algorithms and protocols, specially in symmetric cryptography, post-quantum public-key cryptography, RFID protocols and distance bounding. He wrote an Essay on cryptography (in French, published by PPUR) and a textbook on cryptography (published by Springer). He was program chair of several research conferences and workshops: ACNS’14, INDOCRYPT’13, AFRICACRYPT’12, SAC’11, AFRICACRYPT’08, EUROCRYPT’06, MYCRYPT’05, PKC’05, SAC’01, and FSE’98. In 2007-12, he was an elected director of the IACR (International Association for Cryptologic Research).
|Jean-Louis Lanet leads the High Security Labs of INRIA in Rennes. He was a full Professor in the Computer Science Department at University of Limoges from 2007. He is also the team leader of SSD (Smart Secure Device) research group. Prior to that, he was a senior researcher at Gemplus Research Labs (1996-2007). During this period he spent two years at INRIA (Sophia-Antipolis) (2003-2005) as an engineer at DirDRI (Direction des Relations Industrielles) and as a senior research associate in the Everest team. He started his career as a researcher at Elecma, Electronic division of the Snecma, now a part of the Safran group (1984-1995) and his field of research was on jet engine control. His current research interests include security of small systems like smart cards and software engineering.|
|Paolo D’Arco received in 2002 a PhD in Computer Science, from the University of Salerno (Italy). From November 2001 to October 2002, he was a post-doctoral fellow at the Centre for Applied Cryptographic Research (CACR), in the Department of Combinatorics and Optimization (University of Waterloo). Since March 2015 he is Associate Professor at the Computer Science Department of the University of Salerno (Italy). His main research interests are cryptography, algorithms and data security.|
He has worked on the design and the analysis of unconditionally secure cryptographic primitives and protocols, (e.g., secret sharing schemes, key distribution, distributed oblivious transfer, private information retrieval from a database) and on some computationally secure schemes (e.g., robust and distributed broadcast schemes, anonymous communication schemes, RFID authentication). He has also done some cryptanalysis of new protocols. Currently, he is interested in efficient protocols for secure multi-party computation.
Since 2005 he has been member of several program committees of international conferences and he has published many papers in international journals and in the proceedings of conferences in theoretical computer science, cryptography and data security.
|Ferucio Laurentiu Tiplea received the Ph.D. degree in computer science from “Alexandru Ioan Cuza” University of Iasi, Romania, in 1993. He joined the Department of Computer Science of the aforementioned university in 1990, where he is currently Professor of Computer Science. Dr. Tiplea’s research interests lie in the area of theories and tools for high-level modeling, design, and analysis of systems, computability and complexity, and cryptography and computer security. He published more than 80 papers in professional journals and refereed conference proceedings in these areas, co-edited five conference volumes, contributed to six edited volumes, and delivered invited talks at many universities and international conferences. Dr. Tiplea was the recipient of several fellowships, such as the Fulbright Fellowship, German Academy Fellowship, DAAD Fellowship, Monbusho Fellowship. From December 2003 to May 2006 he held a Visiting Professor position at University of Central Florida, School of Computer Science, Orlando (USA).|
|SECITC 2016 will take place at the National Military Palace in the heart of Bucharest, the capital of Romania.|
The address is:
The National Military Palace
Constantin Mille 1, Sector 1,
Tel: + 40 21 314 95 51
Fax: + 40 21 315 09 60
The meeting site is in the city center, close to “Universitatii” Square Subway Station – please see the map. Use the main entrance on the left side of the National Military Palace and take the elevators to the third floor. Follow the signs to reach the conference.