loading
Documentation
  • Login
  • Sign-Up

Research.Publish.Connect.

Proceedings

Proceedings of the 12th International Conference on Security and Cryptography

July 20-22, 2015, in Colmar, Alsace, France

ISBN: 978-989-758-117-5

Conference Link: http://www.secrypt.icete.org/

Foreword: We warmly welcome you to SECRYPT 2015 - the International Conference on Security and Cryptography, which is held, this year in Colmar, Alsace, France. The SECRYPT 2015 is integrated in the ICETE (International Conference on e-Business and Telecommunications) joint conference, which puts together six complementary conferences, namely DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP and WINSYS, covering a broad range of related fields, including data communication networking, e-business, optical communication systems, security and privacy, signal processing and multimedia applications, and wireless networks and information systems. Sponsored by INSTICC (the Institute for Systems and Technologies of Information, Control and Communication) and co-organized by the University of Haute Alsace, the SECRYPT is held in cooperation with ACM SIGSAC (Special Interest Group on Security, Audit and Control) and IACR (International Association for Cryptologic Research) and technically co-sponsored by the IEEE System Council. Moreover, it has WfMC (Workflow Management Coalition), OMG (Object Management Group), and FIPA (The Foundation for Intelligent Physical Agents) as an Organizational Sponsors. We would like to emphasize that ICETE 2015 includes four distinguished keynote lectures, delivered by experts in their fields, including (alphabetically): Anthony C. Boucouvalas (University of Peloponnese, Greece), John Domingue (The Open University, United Kingdom), Eleni Karatza (Aristotle University of Thessaloniki, Greece) and Andrew Moore (University of Cambridge, United Kingdom). With its six segments, we expect it to appeal to a global audience of the engineers, scientists, business practitioners and policy experts, interested in R&D on Telecommunication Systems and Services. All tracks focus on research related to real world applications and rely on contributions not only from academia, but also from industry, business and government, with different solutions for end-user applications and enabling technologies, in a diversity of communication environments. The accepted papers demonstrate a number of new and innovative solutions and the vitality of these research areas. In response to the call for papers, 124 manuscripts were submitted to SECRYPT 2015. The reviewing process was double blind (meaning the identity of the authors was not known to reviewers, and vice-versa). Each paper was reviewed by at least 3 members of the Program Committee. The review process was rigorous and selective, resulting in the acceptance of 13 full papers (10.4% acceptance rate). With this acceptance ratio, SECRYPT 2015 continues the tradition of previous conferences as a distinguished and high-quality conference. Extended versions of selected best papers of the conference will be invited to appear in a post-conference book that will be published by Springer. A successful conference involves more than paper presentations alone. It is also a meeting place, where ideas about new research projects and other ventures are discussed and debated. Therefore, a social event including a conference dinner/banquet has been planned for evening of July 21st in order to promote this kind of social networking. We would like to express our thanks to all colleagues involved in supporting this conference. We would like to thank in particular: the members of the Program Committee and the external reviewers, who really did a great job, devoting expertise and time in reviewing the papers and participating in the discussion process. We would like to thank all the authors who submitted papers, whether or not the paper was eventually included in the program. We would like to thank Giovanni Livraga for serving as publicity chair. We would also like to thank the panelists and invited speakers for their invaluable contribution, in sharing their vision, knowledge and research outcomes. Special thanks go to the leadership, faculty and staff of the Institut Universitaire de Technologie de Colmar for hosting the conference. Finally, a word of appreciation for the hard work of the INSTICC team; organizing a conference of this level is a task that can only be achieved by the collaborative effort of a dedicated and highly capable team. We hope that the papers accepted and included in the proceedings may be helpful references in future works for all those who need to address topics in security and cryptography, as well as other ICETE knowledge areas. Enjoy the program and your stay in Colmar. (More)

Volumes:

Vol. 1 - 978-989-758-117-5

Show papers

P. 163 - 169
DOI:10.5220/0005500001630169

P. 228 - 235
DOI:10.5220/0005535202280235

P. 398 - 404
DOI:10.5220/0005569703980404

Show authors