We warmly welcome you to SECRYPT 2012 - the International Conference on Security and Cryptography, which is held in Rome, Italy. SECRYPT reflects a continuing effort to increase the dissemination of recent research among professionals who work on the fields of security and cryptography and it is integrated as one of the modules of the ICETE joint conference. As always, SECRYPT 2012 is integrated in the ICETE (International Conference on e-Business and Telecommunications) joint conference, which puts together six complementary conferences, namely DCNET, ICE-B, OPTICS, SECRYPT, SIGMAP and WINSYS, covering a broad range of related fields, including data communication networking, e-business, optical communication systems, security and cryptography, signal processing and multimedia applications, and wireless networks and information systems. Sponsored by INSTICC (the Institute for Systems and Technologies of Information, Control and Communication), the ICETE joint conference is
technically co-sponsored by the IEEE Systems Council and held in cooperation with ACM SIGMM (Special Interest Group on Multimedia) and ACM SIGMIS (Special Interest Group on Management Information Systems). In the program for ICETE, we have included distinguished keynote lectures, papers, and posters to present the widest possible view on its technical areas. With its five tracks, we expect to appeal to a global audience of the engineers, scientists, business practitioners and policy experts, interested in R&D on Telecommunication Systems and Services. All tracks focus on research related to real world applications and rely on contributions not only from academia, but also from industry, with different solutions for end-user applications and enabling technologies, in a diversity of communication environments. The proceedings demonstrate a number of new and innovative solutions and the vitality of these research areas. ICETE 2012 received 403 papers in total, with contributions from 56 different countries, in all continents, which demonstrate its success and global dimension. To evaluate each submission, a double-blind paper evaluation method was used: each paper was blindly reviewed by at least two experts from the International Program Committee. In fact, most papers had 3 reviews or more. The selection process followed strict criteria in all tracks so only 45 papers were accepted and orally presented at ICETE as full papers (11% of submissions) and 77 (23 for SECRYPT) as short papers (19% of submissions). Additionally, 50 papers (19 for SECRYPT) were accepted for poster presentation. With these acceptance ratios, ICETE 2012 continues the tradition of previous ICETE conferences, a quality conference of high calibre. The extended versions of selected best papers of the conference will be invited to appear in a post-conference book that will be published by Springer. We would like to emphasize that ICETE 2012 includes several outstanding keynote lectures, which are relevant to today’s lines of research, development and technical innovation. These talks are presented by distinguished researchers who are internationally renowned experts in one or more of the ICETE areas, and who help enhancing the overall quality of our Conference with their outstanding contributions. A successful conference involves more than paper presentations; it is also a meeting place, where ideas about new research projects and other ventures are discussed and debated. Therefore, a social event including a conference diner/banquet has been planned for the evening of July 26 in order to promote this kind of social networking. We would like to express our thanks to all colleagues involved in supporting this conference. First of all, we thank all authors including those whose papers were not included in the program. We also would like to thank all members of the international program committee and reviewers, who provided an invaluable help with their expertise, dedication and time. We would also like to thank the invited speakers for their invaluable contribution, in sharing their vision and knowledge. Finally, a word of appreciation for the hard work of the INSTICC team; organizing a conference of this level is a task that can only be achieved by the collaborative effort of a dedicated and highly capable team. We hope that these proceedings may be a helpful reference in future works for all those who need to address topics in the areas of security and cryptography as well as other ICETE knowledge areas. Enjoy the program and your stay in Rome.
Vol. 1 - 978-989-8565-24-2