Skip to content

SecITC 2016

The 9th International Conference on Security for Information Technology and Communications (SecITC 2016) will be held in Bucharest, Romania on June 8-9th, 2016. The conference venue will be the Palace of the National Military Circle, located right in the heart of Bucharest, the capital city of Romania.

Program Committee Chairs:

flagIon BICAMilitary Technical AcademyROMANIA
flagReza REYHANITABARNEC Laboratories EuropeGERMANY

Program Committee – Surname alphabetical order

flagElena ANDREEVACOSIC, KU LeuvenBELGIUM
flagLudovic APVRILLEInstitut Mines-Telecom / Telecom ParisTechFRANCE
flagGildas AVOINEINSA RennesFRANCE
flagCatalin BOJABucharest University of Economic StudiesROMANIA
flagChristophe CLAVIERUniversité de LimogesFRANCE
flagPaolo D’ARCOUniversity of SalernoITALY
flagRoberto DE PRISCOUniversity of SalernoITALY
flagEric FREYSSINETMinistry of Interior / Cyberthreats delegationFRANCE
flagHelena HANDSCHUHRambus – Cryptography ResearchUSA
flagShoichi HIROSEUniversity of FukuiJAPAN
flagXinyi HUANGFujian Normal UniversityCHINA
flagMiroslaw KUTYLOWSKIWroclaw University of TechnologyPOLAND
flagBart MENNINKCOSIC, KU LeuvenBELGIUM
flagKazuhiko MINEMATSUNEC CorporationJAPAN
flagYi MUUniversity of WollongongAUSTRALIA
flagDavid NACCACHEENSFRANCE
flagUdaya PARAMPALLIThe University of MelbourneAUSTRALIA
flagVictor Valeriu PATRICIUMilitary Technical AcademyROMANIA
flagJosef PIEPRZYKQueensland University of Technology, BrisbraneAUSTRALIA
flagPierangela SAMARATIUniversità degli Studi di MilanoITALY
flagDamien SAUVERONUniversity of LimogesFRANCE
flagEmil SIMIONITA – Advanced Technologies Institute and University “Politehnica” from BucharestROMANIA
flagAgusti SOLANASSmart Health Research Group, Rovira i Virgili UniversitySPAIN
flagRainer STEINWANDTFlorida Atlantic UniversityUSA
flagCristian TOMABucharest University of Economic StudiesROMANIA
flagDenis TRCEKUniversity of LjubljanaSLOVENIA
flagMichael TUNSTALLRambus – Cryptography ResearchUSA
flagQianhong WUBeihang UniversityCHINA
flagKan YASUDANTT Corporation Research Laboratory, NTTJAPAN
flagLei ZHANGEast China Normal UniversityCHINA

International Advisory Board – Surname alphabetical order

flagVincent CHARVILLATUniversité de ToulouseFRANCE
flagOvidiu DAESCUThe University of Texas at DallasU.S.A
flagPhilippe DHAUSSYENSTA-Bretagne, BrestFRANCE
flagTraian MUNTEANUniversité de la Méditerranée, MarseilleFRANCE
flagPavel POLECHTCHOUKIngenico CompanyAustralia
flagVincent RIJMENK.U. LeuvenBELGIUM
flagFlorentin SMARANDACHEUniversity of New MexicoU.S.A
flagJacques STERNÉcole Normale Supérieure, ParisFRANCE
flagBhavani THURAISINGHAMThe University of Texas at Dallas / Cyber Security Research and Education Center – CySRECU.S.A
flagIan TAYLORCardiff School of Computer Science and Informatics/Consultant @ Naval Research Laboratory in Washington DC, USAUK
flagNicolae TAPUSUniversity “Politehnica” from BucharestROMANIA
flagBogdan WARINSCHIUniversity of BristolUK

Organization Committee and Technical Support Team

  • Mihai DOINEA – Bucharest University of Economic Studies, ROMANIA
  • Cristian CIUREA – Bucharest University of Economic Studies, ROMANIA
  • Luciana MOROGAN – Military Technical Academy, ROMANIA
  • Andrei-George OPRINA – Advanced Technologies Institute, ROMANIA
  • Marius POPA – Bucharest University of Economic Studies, ROMANIA
  • Mihai PURA – Military Technical Academy, ROMANIA
  • Mihai TOGAN – Military Technical Academy, ROMANIA

Call for papers:

SECITC brings together computer security researchers, cryptographers, industry representatives and graduate students interested in any aspect of information security and privacy. One of SECITC’s primary goals is to bring together security and privacy researchers and professionals from different communities and provide a forum allowing the informal exchanges necessary for the emergence of new scientific and industrial collaborations. SECITC 2015 post-proceedings was published by Springer as LNCS vol. 9522 in a book titled “Innovative Security Solutions for Information Technology and Communications”. Paper submission and refereeing for SECITC 2016 will take place via EasyChair and the post-proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.

One originality of SECITC is its Exploits Session. In this session, new exploit authors will be invited to explain how exploits were discovered and submit a formal research paper describing their discoveries. While the discovery of new exploits is a high-risk high-gain investment that requires creativity and tenacious work, exploits are usually difficult to publish in mainstream research conferences. Exploit paper acceptance criteria will be the exploit’s nature, novelty and impact.

The conference topics comprise all aspects of information security, including but not limited to the following areas:
Access control, Algorithmic tools for security and cryptography, All aspects of cryptography, Application security, Attacks and defences, Authentication biometry, Censorship and censorship-resistance, Cloud Security, Distributed systems security, Embedded systems security, Digital forensics, Hardware security, Information flow analysis, Internet of Things (IoT) Security, Intrusion detection, Language-based security, Malware, Mobile security and privacy, Network security, New exploits, Policy enforcements, Privacy and anonymity, Protocol security, Reverse-engineering and code obfuscation, Security architectures, Security aspects of alternative currencies, Side channel attacks, Surveillance and anti-surveillance, System security.

Instructions for authors:

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other journal, conference/workshop with proceedings. The submission should begin with a title followed by a short abstract and keywords. Submissions must be in PDF format and should have at most 12 pages excluding the bibliography and appendices, and at most 20 pages in total, using at least 11-point fonts and with reasonable margins. All submissions must be anonymous. The reviewers are not required to read appendices—the paper should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers should guarantee that at least one of the authors will attend the conference and present their paper.
Paper submission and review process is handled via EasyChair platform. All submissions must be in PDF format. For paper submission follow the following link: https://easychair.org/conferences/?conf=secitc2016

As the final accepted papers will be published in LNCS by Springer, it is recommended that the submissions be processed in LaTeX2e according to the instructions listed on the Springer’s LNCS Webpage: www.springer.com/lncs. These instructions are mandatory for the final papers.
In particular, Springer’s LNCS paper formatting requirements can be found at:
http://www.springer.com/computer/lncs/lncs+authors?SGWID=0-40209-0-0-0

DEADLINES – PROGRAM:
Important deadlines:
Full Paper Submission: April 15, 2016 at 23:59 UTC/GMT 
March 4, 2016 at 23:59 UTC/GMT
Notification of decision: May 16, 2016
Proceedings version due: May 25, 2016
Conference: June 9-10, 2016

Program:

The conference program is available for download.

KEYNOTE SPEAKERS:
Serge Vaudenay entered at the Ecole Normale Supérieure in Paris in 1989 with a major in mathematics. He received his PhD in computer sciences from University of Paris 7 – Denis Diderot in 1995. He subsequently became a research fellow at CNRS (National Center for Scientific Research in France). In 1999, he was appointed as a Professor at the EPFL, where he created the Security and Cryptography Laboratory.
He works on cryptography and the security of digital information. Most of his work relates to security analysis and provable security of cryptographic algorithms and protocols, specially in symmetric cryptography, post-quantum public-key cryptography, RFID protocols and distance bounding. He wrote an Essay on cryptography (in French, published by PPUR) and a textbook on cryptography (published by Springer). He was program chair of several research conferences and workshops: ACNS’14, INDOCRYPT’13, AFRICACRYPT’12, SAC’11, AFRICACRYPT’08, EUROCRYPT’06, MYCRYPT’05, PKC’05, SAC’01, and FSE’98. In 2007-12, he was an elected director of the IACR (International Association for Cryptologic Research).
Jean-Louis Lanet leads the High Security Labs of INRIA in Rennes. He was a full Professor in the Computer Science Department at University of Limoges from 2007. He is also the team leader of SSD (Smart Secure Device) research group. Prior to that, he was a senior researcher at Gemplus Research Labs (1996-2007). During this period he spent two years at INRIA (Sophia-Antipolis) (2003-2005) as an engineer at DirDRI (Direction des Relations Industrielles) and as a senior research associate in the Everest team. He started his career as a researcher at Elecma, Electronic division of the Snecma, now a part of the Safran group (1984-1995) and his field of research was on jet engine control. His current research interests include security of small systems like smart cards and software engineering.
Paolo D’Arco received in 2002 a PhD in Computer Science, from the University of Salerno (Italy). From November 2001 to October 2002, he was a post-doctoral fellow at the Centre for Applied Cryptographic Research (CACR), in the Department of Combinatorics and Optimization (University of Waterloo). Since March 2015 he is Associate Professor at the Computer Science Department of the University of Salerno (Italy). His main research interests are cryptography, algorithms and data security.
He has worked on the design and the analysis of unconditionally secure cryptographic primitives and protocols, (e.g., secret sharing schemes, key distribution, distributed oblivious transfer, private information retrieval from a database) and on some computationally secure schemes (e.g., robust and distributed broadcast schemes, anonymous communication schemes, RFID authentication). He has also done some cryptanalysis of new protocols. Currently, he is interested in efficient protocols for secure multi-party computation.
Since 2005 he has been member of several program committees of international conferences and he has published many papers in international journals and in the proceedings of conferences in theoretical computer science, cryptography and data security.
Ferucio Laurentiu Tiplea received the Ph.D. degree in computer science from “Alexandru Ioan Cuza” University of Iasi, Romania, in 1993. He joined the Department of Computer Science of the aforementioned university in 1990, where he is currently Professor of Computer Science. Dr. Tiplea’s research interests lie in the area of theories and tools for high-level modeling, design, and analysis of systems, computability and complexity, and cryptography and computer security. He published more than 80 papers in professional journals and refereed conference proceedings in these areas, co-edited five conference volumes, contributed to six edited volumes, and delivered invited talks at many universities and international conferences. Dr. Tiplea was the recipient of several fellowships, such as the Fulbright Fellowship, German Academy Fellowship, DAAD Fellowship, Monbusho Fellowship. From December 2003 to May 2006 he held a Visiting Professor position at University of Central Florida, School of Computer Science, Orlando (USA).
INFO:
SECITC 2016 will take place at the National Military Palace in the heart of Bucharest, the capital of Romania.
The address is:
The National Military Palace
Constantin Mille 1, Sector 1,
Bucharest, Romania
Tel: + 40 21 314 95 51
Fax: + 40 21 315 09 60
The meeting site is in the city center, close to “Universitatii” Square Subway Station – please see the map. Use the main entrance on the left side of the National Military Palace and take the elevators to the third floor. Follow the signs to reach the conference.