Call for Papers

This conference is the flagship event of the International Federation for Information Processing (IFIP) Technical Committee 11 on Security and Privacy Protection in Information Processing Systems (TC-11). Previous SEC conferences were held in: Heraklion (Greece) 2012, Lucerne (Switzerland) 2011, and Brisbane (Australia) 2010.

We seek submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and privacy protection in Information Systems.

Topics of interest include, but are not limited to:

  • Access control and authentication
  • Applied cryptography
  • Cloud security
  • Critical Infrastructure Protection
  • Data and Applications Security
  • Digital Forensics
  • Human Aspects of Information Security and Assurance
  • Identity Management
  • Information Security Education
  • Information Security Management
  • Information Technology Mis-Use and the Law
  • Managing information security functions
  • Mobile security
  • Multilateral Security
  • Network & Distributed Systems Security
  • Pervasive Systems Security
  • Privacy protection
  • Trust Management

Timetable

Deadline for submissions: 25 January 2013 (Extended to 4 February 2013)
Notification of acceptance: 15 March 2013 12 April 2013
Submission of the camera-ready version of the paper: 15 April 2013 25 April 2013

Instructions for paper submission

All papers must be written in English. Submissions should be at most 14 pages long in total. Submitted papers must be original, unpublished, and not submitted to another conference or journal for consideration and following the Springer formatting instructions. See www.springer.com/lncs.

Each paper will receive at least three reviews. Accepted papers will be presented at the conference and included in the conference proceedings published in the IFIP AICT series of the official IFIP publisher: Springer Science and Business Media.

At least one author of each accepted paper is required to register with the conference and present the paper. Papers must be submitted using the EasyChair conference management system.

After the conference, extended versions of selected papers will be considered for publication in the journals “Computers & Security” and “Journal of Critical Infrastructure Protection”. Those papers will undergo at least one other review round.