loading
Documentation
  • Login
  • Sign-Up

Research.Publish.Connect.

Proceedings

Proceedings of the International Conference on Security and Cryptography

July 26-28, 2010, in University of Piraeus, Greece

ISBN: 978-989-8425-18-8

Conference Link: http://www.secrypt.icete.org/

Foreword: We warmly welcome you to SECRYPT 2010 - the International Conference on Security and Cryptography, which is held, this year, in Athens, Greece, hosted by the University of Piraeus. SECRYPT reflects a continuing effort to increase the dissemination of recent research among professionals who work on the fields of security and cryptography and it is integrated as one of the modules of the ICETE joint conference. As always, SECRYPT 2010 is integrated in the ICETE (International Conference on e-Business and Telecommunications) joint conference, which puts together six complementary conferences, namely DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP and WINSYS, covering a broad range of related fields, including data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wireless networks and information systems. Sponsored by INSTICC (the Institute for Systems and Technologies of Information, Control and Communication), the conference is technically co-sponsored by IEEE Communications Society and IEEE Systems, Man and Cybernetics, and held in cooperation with IACR (the International Association for Cryptologic Research), ACM SIGSAC (Special Interest Group on Security, Audit and Control), ACM SIGMM (Special Interest Group on Multimedia), and IEICE (the Japanese Institute of Electronics, Information and Communication Engineers). In the program for ICETE, we have included keynote lectures, papers, and posters to present the widest possible view on these technical areas. With its five tracks, we expect to appeal to a global audience of the engineers, scientists, business practitioners and policy experts, interested in R&D on Telecommunication Systems and Services. All tracks focus on research related to real world applications and rely on contributions not only from academia, but also from industry, with different solutions for end-user applications and enabling technologies, in a diversity of communication environments. The proceedings demonstrate a number of new and innovative solutions and the vitality of these research areas. ICETE has received 422 papers in total, with contributions from 46 different countries, in all continents, which demonstrates the success and global dimension of ICETE 2010. To evaluate each submission, a double blind paper evaluation method was used: each paper was reviewed by at least two experts from the International Program Committee, in a double-blind review process, and most papers had 3 reviews or more. The selection process followed strict criteria in all tracks so only 48 papers were accepted and orally presented at ICETE as full papers (11.3% of submissions) and 74 as short papers (17.5% of submissions). Additionally, 60 papers were accepted for poster presentation. With these acceptance ratios, ICETE 2010 continues the tradition of previous ICETE conferences, based on high quality standards. The best papers of the conference will be invited to appear in a post-conference book that will be published by Springer-Verlag. We would like to emphasize that ICETE 2010 includes several outstanding keynote lectures, which are relevant to today’s lines of research and technical innovation. These talks are presented by distinguished researchers who are internationally renowned experts in one or more of the ICETE areas, and who help enhancing the overall quality of our Conference with their contributions. A successful conference involves more than paper presentations; it is also a meeting place, where ideas about new research projects and other ventures are discussed and debated. Therefore, a social event including a conference dinner/banquet has been planned for the evening of July 27 in order to promote this kind of social networking. We would like to express our thanks to all colleagues involved in supporting this conference. First of all, we thank all authors including those whose papers were not included in the program. Next, we would like to thank all members of the program committee and reviewers, who provided an invaluable help with their expertise, dedication and time. We would also like to thank the invited speakers for their invaluable contribution, in sharing their vision and knowledge. Naturally, a word of appreciation for the work of the secretariat and all other members of the organization, whose diligence in dealing with all organizational issues were essential and required a collaborative effort of a dedicated and highly capable team. We hope that these proceedings may be a helpful reference in future works for all those who need to address topics in the areas of security and cryptography as well as other ICETE knowledge areas. Enjoy the program and your stay in Athens. (More)

Volumes:

Vol. 1 - 978-989-8425-18-8

Show papers

P. 43 - 48
DOI:10.5220/0002936300430048

P. 142 - 151
DOI:10.5220/0002996201420151

P. 196 - 205
DOI:10.5220/0002997301960205

P. 213 - 216
DOI:10.5220/0002981802130216

Show authors