SECITC 2024: International Conference on Security for Information Technology and Communications Bucharest, Romania, November 21-22, 2024 |
Conference website | https://secitc.eu/ |
Submission link | https://easychair.org/conferences/?conf=secitc2024 |
Submission deadline | September 30, 2024 |
Submission deadline extended to *September 30, 2024*.
Speakers, who are not able to attend in person, can present remotely.
----------------------------------------------------------------------------------------------------
CALL FOR PAPERS
SecITC 2024
17th International Conference on Security for Information Technology and Communications
November 21-22, 2024
Bucharest, Romania
https://secitc.eu/
----------------------------------------------------------------------------------------------------
Keynotes:
Peter Y A Ryan, University of Luxembourg, Luxembourg
Carsten Schuermann, IT University of Copenhagen, Denmark
----------------------------------------------------------------------------------------------------
The 17th International Conference on Security for Information Technology and Communications (SecITC 2024) will be held in Bucharest, Romania on November 21-22, 2024.
SecITC brings together computer security researchers, cryptographers, industry representatives and graduate students interested in any aspect of information security and privacy. One of SecITC’s primary goals is connecting security and privacy researchers as well as professionals from different communities and providing a forum that allows informal exchanges necessary for the emergence of new scientific and industrial collaborations. Since 2015, previous SecITC post-proceedings have been published by Springer as LNCS (see https://link.springer.com/conference/itc). Paper submission and refereeing for SecITC 2024 will take place via EasyChair and the post-proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series.
Speakers, who are not able to join in person, can present remotely.
----------------------------------------------------------------------------------------------------
Conference Topics:
Topics comprise all aspects of Information Security, including but not limited to the following areas:
-Access Control,
-Algorithmic Tools for Security and Cryptography,
-Applied Cryptography,
-Artificial Intelligence for Security,
-Cryptology,
-Application Security,
-Attacks and Defenses,
-Authentication Biometry,
-Censorship and Censorship-Resistance,
-Cloud Security,
-Distributed Systems Security,
-Embedded Systems Security,
-Digital Forensics,
-Hardware Security,
-Information Flow Analysis,
-Internet of Things (IoT) Security,
-Intrusion Detection,
-Language-Based Security,
-Malware,
-Machine learning and computer security,
-Mobile Security and Privacy,
-Network Security,
-New Exploits,
-Policy Enforcements,
-Privacy and Anonymity,
-Protocol Security,
-Reverse-Engineering and Code Obfuscation,
-Security Architectures,
-Security Aspects of Alternative Currencies,
-Side-Channel Attacks,
-Surveillance and Anti-Surveillance,
-Systems Security.
----------------------------------------------------------------------------------------------------
Instructions for Authors:
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel for consideration of any other journal, conference/workshop with proceedings. The submission should begin with a title followed by a short abstract and keywords. All submissions must be anonymous. Submissions must be in PDF format and should have at most 12 pages excluding the bibliography and appendices, and at most 20 pages in total. The reviewers are not required to read appendices, the paper should be intelligible without them.
All submissions must be prepared in LaTeX2e according to the instructions listed on the Springer’s LNCS Webpage: www.springer.com/lncs. In particular, Springer’s LNCS paper formatting requirements can be found athttps://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines
Submissions not meeting these guidelines risk rejection without consideration of their merits. Authors of accepted papers should guarantee that at least one of the authors will present the paper.
Paper submission and review process is handled via the EasyChair platform. For paper submission use the following link: https://easychair.org/conferences/?conf=secitc2024
----------------------------------------------------------------------------------------------------
Important Dates:
Paper submission deadline: September 30th, 2024 at 23:59 AoE
Notification of decisions: October 30th, 2024
Proceedings version deadline: November 15th, 2024
Conference: November 21-22nd, 2024
----------------------------------------------------------------------------------------------------
Program Chairs:
Luciana MOROGAN (Military Technical Academy “Ferdinand I”, ROMANIA)
Peter ROENNE (University of Luxembourg, LUXEMBOURG)
----------------------------------------------------------------------------------------------------
Program Committee:
Iulian Aciobanitei, Military Technical Academy "Ferdinand I"
Raja Naeem Akram, Department of Computer Science, University of Aberdeen. United Kingdom
Claudio Ardagna, Universita' degli Studi di Milano - Dipartimento di Informatica
Afonso Arriaga, APSIA / SnT - University of Luxembourg
Lasse Berntzen, University of South-Eastern Norway
Ion Bica, Military Technical Academy
Catalin Boja, Bucharest University of Economic Studies
Guillaume Bouffard, National Cybersecurity Agency of France (ANSSI)
Michele Carminati, Politecnico di Milano
Paolo D'Arco, University di Salerno
Roberto De Prisco, Dip. Informatica ed Appl. Università di Salerno
Eric Diehl, Sony Pictures
Mihai Doinea, Bucharest University of Economic Studies
Constantin Catalin Dragan, University of Surrey
Vlad Dragoi, LITIS
Petr Dzurenda, Brno University of Technology
Eric Freyssinet, LORIA
Rémi Géraud-Stewart, Ecole normale supérieure
Dieter Gollmann, Hamburg University of Technology
Johann Groszschaedl, University of Luxembourg
Helena Handschuh,
Shoichi Hirose, University of Fukui
Vincenzo Iovino, Aragon ZK Research
Nesrine Kaaniche, Telecom SudParis
Mehmet Sabir Kiraz, De Montfort University
Diana Maimut, Advanced Technologies Institute
Mark Manulis, Universität der Bundeswehr München
David Naccache, ENS
Ruxandra F. Olimid, Norwegian University of Science and Technology and University of Bucharest
Andrei George Oprina, Advanced Technologies Institute
Olivier Pereira, UCLouvain
Marius Popa, Bucharest University of Economic Studies, Faculty of Cybernetics, Statistics and Economic Informatics
Sara Ricci, Brno University of Technology
P. Y. A. Ryan, University of Luxembourg
Damien Sauveron, XLIM (UMR University of Limoges/CNRS 7252)
Emil Simion, University POLITEHNICA of Bucharest
Agusti Solanas, Smart Health Research Group | Rovira i Virgili University
El Mamoun Souidi, Mohammed V University in Rabat
Riccardo Spolaor, Shandong University
Pantelimon Stanica, Naval Postgraduate School
Rainer Steinwandt, The University of Alabama in Huntsville
George Teseleanu, IMAR
Norbert Tihanyi, Eötvös Loránd University
Ferucio Laurentiu Tiplea, Alexandru Ioan Cuza University of Iasi
Mihai Togan, Military Technical Academy
Cristian Toma, Department of Economic Informatics and Cybernetics, Bucharest University of Economic Studies
Denis Trcek, University of Ljubljana
Valérie Viet Triem Tong, CentraleSupelec
Dragoi Vlad, Litis
Qianhong Wu, Beihang University
Sule Yildirim-Yayilgan, Norwegian University of Science and Technology
Lei Zhang, East China Normal University