11th International Conference on Security for Information Technology and Communications

SECITC 2018


Computer Security & Cryptography Security & Trust & Testing



SECITC - http://www.secitc.eu brings together computer security researchers, cryptographers, industry representatives and graduate students interested in any aspect of information security and privacy. One of SECITC’s primary goals is to bring together security and privacy researchers and professionals from different communities and provide a forum allowing the informal exchanges necessary for the emergence of new scientific and industrial collaborations. Regarding the scientific papers dissemination, SECITC 2017 post-proceedings was published by Springer as LNCS vol. 10543, SECITC 2016 post-proceedings was published by Springer as LNCS vol. 10006 and for SECITC 2015 post-proceedings was published by Springer as LNCS vol. 9522 in a book titled “Innovative Security Solutions for Information Technology and Communications”. The paper submission and refereeing for SECITC 2018, will take place via EasyChair: https://easychair.org/conferences/?conf=secitc2018 and the post-proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series. In the year 2018, the board is targeting to have a stronger focus on the technologies from the Cyber Security field without impacting the Crypto focus.
The conference topics comprise all aspects of information security, including but not limited to the following areas:
-Access control,
-Cryptography, biometric and watermarking,
-Application security,
-Attacks and defences,
-Blockchain Security and Security aspects of alternative currencies,
-Censorship and censorship-resistance,
-Cloud and Web Security,
-Distributed systems security,
-Embedded systems security,
-Digital forensics,
-Hardware security,
-Information flow analysis,
-Internet of Things (IoT) Security,
-Intrusion detection and prevention system,
-Language-based security,
-Malware and Ransomware,
-Mobile security,
-Network security,
-New exploits,
-Policy enforcements,
-Privacy and anonymity,
-Protocol security,
-Reverse-engineering and code obfuscation,
-Security architectures,
-Side channel attacks,
-Surveillance and anti-surveillance,
-System security,
-Trust management