SECRYPT is organized by INSTICC - Institute for Systems and Technologies of Information, Control and Communication


The purpose of SECRYPT 2008 the International Conference on Security and Cryptography is to bring together researchers, mathematicians, engineers and practitioners interested on security aspects related to information and communication. Theoretical and practical advances in the fields of cryptography and coding are a key factor in the growth of data communications, data networks and distributed computing. In addition to the mathematical theory and practice of cryptography and coding, SECRYPT also focus on other aspects of information systems and network security, including applications in the scope of the knowledge society in general and information systems development in particular, especially in the context of e-business, internet and global enterprises.

Information theory and information security are hot topics nowadays, ranging from statistics and stochastic processes to coding, from detection and estimation to Shannon theory, from data compression to data networks and systems security, cryptography as well as many other topics that can be listed, as indicated below. SECRYPT is mainly interested in contributions related to ideas on how to analyze and approach security problems by combining information and communication technologies with the appropriate theoretical work including information theory and communication theory, either in the scope of R&D projects, engineering or business applications, are welcome. Papers describing new methods or technologies, advanced prototypes, systems, tools and techniques and general survey papers indicating future directions are also encouraged.

Papers describing original work are invited in any of the areas listed below. Accepted papers, presented at the conference by one of the authors, will be published in the Proceedings of SECRYPT, with an ISBN. Acceptance will be based on quality, relevance and originality. Both full research reports and work-in-progress reports are welcome. There will be both oral and poster sessions.

The best papers will be selected to appear either in an international journal or in a book to be published by Springer.

Special sessions, case-studies and tutorials dedicated to technical/scientific topics related to the main conference are also envisaged: researchers interested in organizing a special session, or companies interested in presenting their products/methodologies or researchers interested in holding a tutorial are invited to contact the conference secretariat. Additional information can be found at .


Each of these topic areas is expanded below but the sub-topics list is not exhaustive. Papers may address one or more of the listed sub-topics, although authors should not feel limited by them. Unlisted but related sub-topics are also acceptable, provided they fit in one of the following main topic areas:

Access Control and Intrusion Detection

Network Security and Protocols

Cryptographic Techniques and Key Management

Information Assurance

Security in Information Systems


Area 1: Access Control and Intrusion Detection

  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Identity and Trust Management
  • Biometric Security
  • Trust models and metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Access Control in Computing Environments
  • Multiuser Information

Area 2 : Network Security and Protocols

  • IPsec, VPNs and encryption modes
  • Service and Systems Design and QoS Network Security
  • Fairness Scheduling and QoS Guarantee
  • Reliability and Dependability
  • Web Performance and Reliability
  • Denial of Service and other attacks
  • Data and Systems Security
  • Data Access & Synchronization
  • GPRS and CDMA Security
  • Mobile System Security
  • Ubiquitous Computing Security
  • Security in Localization systems
  • Sensor and Mobile Ad Hoc Network Security
  • Wireless Network Security (WiFi, WiMAX, WiMedia and others)
  • Security of GSM/GPRS/UMTS systems
  • Peer-to-Peer Security
  • E-commerce protocols and micropayment schemes

Area 3 : Cryptographic Techniques and Key Management

  • Smart Card Security
  • Public Key Crypto Applications
  • Coding Theory and Practice
  • Spread Spectrum Systems
  • Speech/Image Coding
  • Shannon Theory
  • Stochastic Processes
  • Quantum Information Processing
  • Mobile Code & Agent Security
  • Digital Rights Management

Area 4 : Information Assurance

  • Planning Security
  • Risk Assessment
  • Security Area Control
  • Organizational Security Policies and Responsability
  • Security Through Collaboration
  • Human Factors and Human Behaviour Recognition Techniques
  • Ethical and Legal Implications
  • Intrusive, Explicit Security vs. Invisible, Implicit Computing
  • Information Hiding
  • Information Systems Auditing
  • Management of Computing Security

Area 5 : Security in Information Systems

  • Security for Grid Computing
  • Secure Software Development Methodologies
  • Security for Web Services
  • Security for Databases and Data Warehouses
  • E-Health
  • Security Engineering
  • Security Information Systems Architectures
  • Security requirements
  • Security Metrics
  • Personal Data Protection
  • XML Security
  • Workflow and Business Process Security


- Ueli Maurer, Swiss Federal Institute of Technology (ETH), Switzerland
- Bart Preneel, University of Leuven, Belgium


Authors should submit a complete paper in English of up to 8 A4 pages, using the submission procedure indicated below. The program committee will review all papers and the contact author of each paper will be notified of the result, by email. Each paper should clearly indicate the nature of its technical/scientific contribution, and the problems, domains or environments to which it is applicable. Authors must also indicate the conference track to which the paper is submitted. The paper must be carefully checked for correct grammar and spelling.

Paper submission procedure

1. A "blind" paper evaluation method will be used. To facilitate that, the authors are kindly requested to produce and provide the full paper, WITHOUT any reference to the authors. The manuscript must contain, in its first page, the paper title, an abstract and a list of keywords but NO NAMES OR CONTACT DETAILS WHATSOEVER are to be included in any part of this file.

2. The contact author will then use the SECRYPT web-based submission facility available at the conference web site, to enter the contact information of all paper authors plus the file indicated in point 1, above. The facility will automatically send a submission acknowledgement, by email, to the author indicated as "contact author".Please contact the secretariat if no acknowledgement is received.

If the author is unable to use the web-based procedure then he/she can send the paper by e-mail to the secretariat attaching an additional file containing: the title, author(s), affiliation(s), contact details, a list of keywords and an abstract. Authors must also indicate the conference area (including the topics), to which the paper is submitted.

The camera-ready format will be enforced only for accepted papers, but authors are encouraged to use it also for paper submissions, in order to reduce extra work later. Two templates are provided at the conference web site: one for Latex and another for MS Word.
Due to space limitations in the Proceedings, the camera-ready versions of accepted papers will be limited to 8 (eight) pages for long oral presentations, 6 (six) for short oral presentations (progress reports) and 4 (four) for poster presentations. If absolutely needed, the number of pages may be increased up to a maximum of 12 (long presentations), 10 (short presentations) and 8 (poster presentations). However, for each page in excess of the maximum allowed, the author will have to pay an additional fee.



All accepted papers will be published in the conference proceedings, under an ISBN reference, in paper and in CD-ROM support.
A book including a selection of the best conference papers will be edited and published by Springer-Verlag.
The proceedings will be indexed by ISI Proceedings, INSPEC and DBLP.
EI already agreed to index the proceedings of SECRYPT 2006. Proceedings of SECRYPT 2007 are under evaluation and the proceedings of SECRYPT 2008 will be evaluated by EI after their publication.


Full Paper Submission: (deadline expired)
Position Paper Submission: (deadline expired)
Full Author Notification: (deadline expired)
Position Paper Notification: (deadline expired)
Final Paper Submission and Registration: (deadline expired)
Conference Date: 26-29 July 2008


SECRYPT Secretariat
Av. D.Manuel I, 27A 2ºesq, 2910-595 Setúbal - Portugal
Tel.: +351 265 520 185
Fax: +44 203 014 5432


Overlooking the Douro River, Porto is one of the most ancient European cities, It was born and developed from the northern bank of this river during the Middle Ages. One of the most significant aspects of Porto and its historical centre is its landscape, combining harmony with the urban structure and presenting a frame of rare beauty. The city was classified as World Heritage by UNESCO in 1996. When discovering Porto, you will find many surprises. Besides its welcoming and conservative environment, Porto is also contemporary and artistic. This is shown not only in the streets, architecture, monuments and museums but also in the terraces, restaurants and leisure and shopping areas.


Joaquim Filipe (Polytechnic Institute of Setúbal / INSTICC, Portugal)
Mohammad S. Obaidat (Monmouth University, U.S.A.)


Manu Malek (Stevens Institute of Technology, U.S.A)
Eduardo Fernández-Medina (UCLM, Spain)
Javier Hernando (Polytechnic University of Catalonia, Spain)


Kamel Adi, University of Quebec in Outaouais, Canada
Gordon Agnew, University of Waterloo, Canada
Gail-Joon Ahn, UNC Charlotte, United States
Luiz Carlos Pessoa Albini, Federal University of Parana, Brazil
Jörn Altmann, Seoul National University ; Intl. University of Bruchsal, Korea
Joonsang Baek, Institute for Infocomm Research, Singapore
Dan Bailey, RSA Laboratories, United States
Lejla Batina, Katholieke Universiteit Leuven, Belgium
Anthony Bedford, RMIT University, Australia
Carlo Blundo, Università di Salerno, Italy
Emmanuel Bresson, DCSSI Crypto Lab, France
Rahmat Budiarto, National Advanced IPv6 (NAv) Center, Malaysia
Roy Campbell, University of Illinois at Urbana-Champaign, United States
Rui Costa Cardoso, University of Beira interior, Portugal
Rajarathnam Chandramouli, Stevens Institute of Technology, United States
Kim-Kwang Raymond Choo, Australian Institute of Criminology, Australia
Christophe Clavier, Gemalto, France
Debbie Cook, Alcatel-Lucent Bell Labs, United States
Nathalie Dagorn, ICN Business School; Nancy, France & LACS, University of Luxembourg, Luxembourg
Mads Dam, KTH - Royal Institute of Technology, Sweden
Paolo D'Arco, University of Salerno, Italy
Bart De Decker, K. U. Leuven, Belgium
Falko Dressler, University of Erlangen, Germany
Robert Erbacher, Utah State University, United States
Eduardo B. Fernandez, Florida Atlantic University, United States
Mário Freire, University of Beira Interior, Portugal
Steven Furnell, University of Plymouth, United Kingdom
David Galindo, Ecole Normale Superieure, France
Paolo Giorgini, University of Trento, Italy
Carlos de Castro Goulart, Federal University of Vicosa, Brazil
Stefanos Gritzalis, University of the Aegean, Greece
Vic Grout, University of Wales, United Kingdom
Javier Herranz, IIIA-CSIC, Spain
Amir Herzberg, Bar Ilan University, Israel
Alejandro Hevia, University of Chile, Chile
Jiankun Hu, RMIT University, Australia
Min-Shiang Hwang, National Chung Hsing University, Taiwan
Cynthia E. Irvine, Naval Postgraduate School, United States
Hamid Jahankhani, University Of East London, United Kingdom
Christian Damsgaard Jensen, Technical University of Denmark, Denmark
Hai Jiang, Arkansas State University, United States
Willem Jonker, Philips Research Europe, The Netherlands
Elias P. Duarte Jr. , Federal University of Parana, Brazil
Pascal Junod, Nagravision SA, Switzerland
Dong Seong Kim, Korea Aerospace University, Korea, Republic Of
Kwangjo Kim, ICU, Korea, Republic Of
Seungjoo Kim, Sungkyunkwan University, Korea, Republic Of
Cetin Koc, Eczacibasi Group, Turkey
Ralf Kuesters, University of Trier, Germany
Albert Levi, Sabanci University, Turkey
Yingjiu Li, Singapore Management University, Singapore
Chae Hoon Lim, Sejong University, Korea
Jukka Manner, Helsinki University of Technology, Finland
Olivier Markowitch, Université Libre de Bruxelles, Belgium
Alexander May, Ruhr-University Bochum, Germany
Gianluigi Me, Università degli Studi di Roma "Tor Vergata", Italy
Breno de Medeiros, Florida State University, United States
Madjid Merabti, Liverpool John Moores University, United Kingdom
Ali Miri, University of Ottawa, Canada
Atsuko Miyaji, Japan Advaned Institute of Science and Technology, Japan
Edmundo Monteiro, University of Coimbra, Portugal
Haralambos Mouratidis, University of East London, United Kingdom
Yi Mu, University of Wollongong, Australia
Volker Müller, University of Luxembourg, Luxembourg
Juan Gonzalez Nieto, Queensland University of Technology, Australia
José Luis Oliveira, University of Aveiro, Portugal
Martin Olivier, University of Pretoria, South Africa
Rolf Oppliger, eSECURITY Technologies, Switzerland
Carles Padro, Universitat Politecnica de Catalunya, Spain
Daniel Page, University of Bristol, United Kingdom
Guenther Pernul, University of Regensburg, Germany
Marinella Petrocchi, IIT-CNR, Italy
Raphael C.-W. Phan, Loughborough University, United Kingdom
Roberto Di Pietro, Universitat Rovira i Virgili, Spain
Joachim Posegga, University of Hamburg, Germany
Atul Prakash, University of Michigan, Greece
Indrakshi Ray, Colorado State University, United States
Indrajit Ray, Colorado State University, United States
Peter Reiher, UCLA, United States
Srinivas Sampalli, Dalhousie University, Canada
David Samyde, Intel, United States
Aldri Santos, Federal University of Paraná, Brazil
Susana Sargento, Instituto de Telecomunicações - Universidade de Aveiro, Portugal
Damien Sauveron, University of Limoges, France
Erkay Savas, Sabanci University, Turkey
Berry Schoenmakers, Technical University of Eindhoven, Netherlands
Bruno R. Schulze, LNCC, Brazil
Alice Silverberg, University of California, Irvine, United States
Nicolas Sklavos, University of Patras, Greece
Mario Spremic, University of Zagreb, Croatia
Yannis Stamatiou, University of Ioannina and Research Academic Computer Technology Institute, Greece
Mark Stamp, San Jose State University, United States
Aaron Striegel, University of Notre Dame, United States
Lily Sun, University of Reading, United Kingdom
Willy Susilo, University of Wollongong, Australia
Tsuyoshi Takagi, Future University-Hakodate, Japan
Ferucio Laurentiu Tiplea, "Al.I.Cuza" University of Iasi, Romania
Ulrich Ultes-Nitsche, University of Fribourg, Switzerland
Guillaume Urvoy-Keller, Institut Eurecom, France
Sabrina De Capitani di Vimercati, University of Milan, Italy
Lan Wang, University of Memphis, United States
Yongge Wang, University of North Carolina, United States
Susanne Wetzel, Stevens Institute of Technology, United States
Duminda Wijesekera, George Mason University, United States
Chaoping Xing, Nanyang Technological University, Singapore
Shouhuai Xu, University of Texas at San Antonio, United States
Mariemma Yagüe, University of Malaga, Spain
Sung-Ming Yen, National Central University, Taiwan
Meng Yu, Monmouth University, United States
Moti Yung, RSA Labs and Columbia University, United States
Fangguo Zhang, Sun Yat-sen University, China, China
André Zúquete, University of Aveiro, Portugal