Related Events


Track 2: Security

The Security Track will address all the security aspects of design, implementation, deployment, architectures and modelling of heterogeneous wired and wireless computer networks, of the virtualization technology, as well as of the pervasive computer applications. It will also provide dynamic forums for researchers, students and professionals to present their research results and development in these areas and will offer the opportunity for a more focused exchange of ideas and presentation of on-going research relevant to information and system security.

Topic areas of interest of this track include, but are not limited to:

  • Authentication protocols and services authorization
  • Data and system integrity and confidentiality
  • Availability of secure services
  • Key Distribution and management, PKI and security management
  • Trust models and Trust establishment
  • Identity management, authentication and access control
  • Deployment and management of computer/network security policies
  • Monitoring Design for security, distributed Intrusion Detection Systems & Countermeasures
  • Single and multi-source intrusion detection and response
  • Traffic filtering and Firewalling
  • IPv6 security, IPSec, Virtual Private Networks (VPNs)
  • Privacy, contract agreements, and payment systems
  • Revocation of malicious parties
  • Prevention, Detection and Reaction Design
  • Light-weight cryptography
  • Quantum Cryptography and QKD
  • Applications of Cryptography and Cryptanalysis in communications security
  • Mobile code security & Security management
  • Secure PHY, MAC, Routing and upper layer protocols
  • Secure Cross layer design
  • Secure naming and addressing (Privacy and anonymity)
  • Network security metrics and performance evaluation
  • Security modelling and protocol design
  • Smart cards and secure hardware
  • Biometric security: technologies, risks and vulnerabilities
  • Information hiding and watermarking
  • Vulnerability, exploitation tools, and virus/worm analysis
  • Distributed Denial-of-Service (DDoS) attacks and countermeasures
  • Cryptographic Hardware and Embedded Systems
  • Web, e-mail , m-commerce, e-business and e-commerce security
  • Testbeds, performance evaluation and formal specification methods
  • Virtualization for security and reliability

Security Program co–chairs
Maryline Laurent, Institut Telecom, Telecom SudParis, France
Nicolas Sklavos, Technological Educational Institute of Patras, Greece

Security Program Committee




Sudhir Aggarwal

Florida State University

Cristina Alcaraz-Tello

University of Malaga

Claudio Ardagna

Università degli Studi di Milano

Davide Balzarotti

Institut EURECOM

Ezedin Barka

UAE University

Erik-Oliver Blass


Carlo Blundo

University of Salerno

Seyit Camtepe

Technische Universität Berlin

Ana Cavalli

INT Evry

Chin-Chen Chang

Feng Chia University

Shiping Chen

Sybase, Inc.

Mauro Conti

Universita' di Roma La Sapienza

Frederic Cuppens

ENST Bretagne

Herve Debar

Télécom SudParis

Lieven Desmet

Katholieke Universiteit Leuven

Roberto Di Pietro

Università di Roma Tre

Christos Dimitrakakis


Tassos Dimitriou

Athens Information Technology

Xuhua Ding

Singapore Management University

El-Sayed El-Alfy


Ahmad Fadlallah

Arab Open University

Josep-Lluis Ferrer-Gomila

University of Balearic Islands

Olivier Festor

INRIA Nancy - Grand Est

Thomaz Figueiredo


Ulrich Flegel

Offenburg University of Applied Sciences

Sara Foresti

Universita' degli Studi di Milano

Apostolos Fournaris

University of Patras

Felix Gomez Marmol

University of Murcia

Lisandro Granville

Federal University of Rio Grande do Sul

Yong Guan

Iowa State University

Vincent Guyot


Mohamed Hamdi

Carthage University

Song Han

Curtin University of Technology

James Hughes

Sun Microsystems

Yixin Jiang

University of Waterloo

Di Jin

General Motors

Georgios Kambourakis

University of the Aegean

Stamatis Karnouskos

SAP Research

Dogan Kesdogan

University of Siegen

Paris Kitsos

Hellenic Open University

Marek Klonowski

TU Wroclaw

Odysseas Koufopavlou

University of Patras

Costas Lambrinoudakis

University of Piraeus

Maryline Laurent

Institut Télécom, Télécom SudParis

Albert Levi

Sabanci University

Flavio Lombardi

National Research Council

Javier Lopez-Munoz

University of Malaga

Chunbo Ma

Guilin University of Electronic Technology

Yoshifumi Manabe

NTT Communication Science Laboratories

Rafael Marin

University of Murcia

Gregorio Martinez Perez

University of Murcia

Fabio Massacci

Univ. of Trento

Mohammed Misbahuddin

Centre for Development of Advanced Computing

Mihai Mitrea


Katerina Mitrokosta


Edward Moreno

UFS - Federal University of Sergipe

Yi Mu

University of Wollongong

David Naccache


Rafael Obelheiro


Leonardo Oliveira


Raphael Phan

Loughborough University

Reinhard Posch

TU Graz

Jean-Jacques Quisquater

Université Catholique De Louvain

Indrakshi Ray

Colorado State University

Kui Ren

Illinois Institute of Technology

Rodrigo Roman

University of Malaga

Kouichi Sakurai

Kyushu University

Altair Santin

Pontifical Catholic University of Parana (PUCPR)

Erkay Savas

Sabanci University

Peter Schoo

Fraunhofer Institute for Secure Information Technology SIT

Mirela Sechi Moretti Annoni Notare

Superior Education Institute - IES/UNIP

Ahmed Serhrouchni


Bartomeu Serra

Universitat de les Illes Balears

Sean Shen


Nicolas Sklavos

Technological Educational Institute of Patras

Agusti Solanas

Rovira i Virgili University

Iwannis Stamatiou

University of Iwannina/CTI

Angelos Stavrou

George Mason University

Patrick Tague

Carnegie Mellon University

Lingyu Wang

Concordia University

Andreas Wespi

IBM Zurich Research Laboratory

Paul Worcester

Manchester Metropolitan University

Yanjiang Yang

Institute for Infocomm Research, Singapore

Alec Yasinsac

University of South Alabama

Yan Zhang

Simula Research Laboratory and University of Oslo






ICC Event