SlideShare a Scribd company logo
1 of 5
Download to read offline
SIN'15: CALL FOR CONTRIBUTIONS
======================
8th International Conference on Security of Information and Networks (SIN 2015)
8-10 September 2015
Sochi, Russia
www.sinconf.org
In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC)
-------------------------
Proceedings by ACM Press; all papers will be inserted into the ACM Digital Library.
-------------------------
In succession to the successful SIN 2007 - SIN 2014, the 8th International Conference on Security of
Information and Networks (SIN 2015) provides an international forum for presentation of research
and applications of security in information and networks. SIN 2015 conference features contributed
as well as invited papers, special sessions, workshops, and tutorials on theory and practice.
SIN 2015 will feature the following keynote papers and talks:
- Ron Poet, The University of Glasgow, UK
Title: TBA
- Ramki Thurimella, The University of Denver, USA
Title: Some New Results in Keyless Jam Resistance Communication (Joint Work with Hamid Hanifi and
Leemon Baird)
Future SIN Conferences are scheduled to take place in the USA (2016) and Australia (2017).
PROPOSALS
==================
Papers, special sessions, tutorials, and workshops addressing all aspects of security in information
and networks are being sought. Researchers and industrial practitioners working on the following
and related subjects are especially encouraged: development and realization of cryptographic
solutions, security schemes, new algorithms; critical analysis of existing approaches; secure
information systems, especially distributed control and processing applications, and security in
networks; interoperability, service levels and quality issues in such systems; information assurance,
security, and public policy; detection and prevention of cybercrimes such as fraud and phishing; next
generation network architectures, protocols, systems and applications; industrial experiences and
challenges of the above. Doctoral students are encouraged to propose papers on ongoing research.
Original papers will be considered; submissions must not substantially duplicate work that any of the
authors has published elsewhere or has submitted in parallel to any other conference or workshop
that has proceedings. All submitted papers will be reviewed by at least three members of the
program committee judging its originality, significance, correctness, presentation and relevance.
Authors are also encouraged to propose position papers on practical studies and experiments,
critique of existing work, emerging issues, and novel ideas under development.
Enterprises and research centers developing, implementing, or using security tools and frameworks
are encouraged to propose application / tool demo.
Proposals of half-day tutorials on fundamental to advanced subjects covering practical
implementation aspects of security are welcome.
Proposals of special session(s) to be held in the main conference are welcome.
Proposals are invited for workshops to be held in conjunction with SIN 2015 Conference. The
workshop proposal theme should be closely related to the conference topics.
Broad areas of interest in security theory, technology and applications will include, but are not
limited to, the following:
* Access control and intrusion detection
* Security of cyber-physical systems
* Autonomous and adaptive security
* Security tools and development platforms
* Computational intelligence techniques in security
* Security ontology, models, protocols & policies
* Computer network defense
* Standards, guidelines and certification
* Cryptographic techniques and key management
* Security-aware software engineering
* Industrial applications of security
* Trust and privacy
* Information assurance
* Next generation network architectures
* Malware analysis
* Network security and protocols
* Security challenges in Mobile/Embedded Systems
* Cloud security
* Security Awareness and Education
The conference will feature the following special sessions in 2015:
* Detecting and Preventing Fraud with Data Analytics
* Cybersecurity of Large-Scale and Distributed Systems
The details about the special sessions can be found at
http://www.sinconf.org/sin2015/index.php/workshops-call-for-workshops
SUBMISSION OF PROPOSALS
=======================
Papers must be submitted electronically via the SIN 2015 Submission Site at
https://cmt.research.microsoft.com/SIN2015/. Title, author's name(s), affiliation, mailing address,
telephone, fax and email of the principal author should be included. Maximum length for the
proceedings is 8 pages for full paper, 4 pages for short paper, 2 pages for fast abstract and position
statement, and 2 pages for demo and tutorial proposals. Extra page charges apply. All papers should
be written according to double-column ACM conference format
(http://www.acm.org/sigs/publications/proceedings-templates).
All proposals for organizing workshops, tutorials, demos, and special sessions are expected at the
conference e-mail sin2015@sinconf.org.
All accepted papers will be published by ACM Press in a conference proceedings and placed into ACM
Digital Library. Extended versions of selected papers will be invited for possible publication in a
special issue of the International Journal of Information Security and Privacy (IJISP) by IGI Global
(http://www.sinconf.org/sin2015/images/docs/IJISP-SIN2015-rev.pdf). Each accepted paper must be
registered to be included in the proceedings. Papers not presented during the conference may be
removed from the online proceedings.
IMPORTANT DATES
===============
Please consult www.sinconf.org site for the most up-to-date info on the following:
Workshop / Special Session Proposals: 1 March 2015 (passed)
Paper Submission by: 11 May 2015 (extended from 20.04.2015)
Tutorial Proposal by: 10 May 2015
Tutorial Notification: 20 May 2015
All Author Notification: 15 June 2015 (extended)
All Papers Camera Ready by: 1 July 2015 (extended)
Author Registration due date: 1 July 2015 (extended)
Tutorial Date: 7 September 2015
Conference Dates: 8-10 September 2015
ORGANIZATION & SPONSORS
=======================
Organized by
------------
- Southern Federal University, Taganrog, Rostov-on-Don, Russia
- The University of Glasgow, Glasgow, UK
- Aksaray University, Aksaray, Turkey
- Malaviya National Institute of Technology, Jaipur, India
- Macquarie University, Sydney, Australia
Supported by
------------
Russian Foundation for Basic Research
Southern Federal University, Russia (pending)
Sponsored by
------------
NeoBIT LLC, St. Petersburg, Russia
NPO Echelon, Moscow, Russia
Hosted by
---------
Department of Security of Information Technologies and South-Russian Regional Scientific-
Educational Center for Information Security Problems, Southern Federal University, Taganrog,
Rostov-on-Don, Russia
Venue
-----
Marins Park Hotel Sochi; 2, Morskoy lane, Sochi, Krasnodar Region, 354000, Russia
ORGANIZATION COMMITTEE
=====================
Honorary Chair: Marina Borovskaya, Rector of Southern Federal University, Russia
Conference Chair: Oleg Makarevich, Southern Federal University, Russia
Conference Co-Chair: Ron Poet, University of Glasgow, UK
Conference Co-Chair: Atilla Elci, Aksaray University, Turkey
Conference Co-Chair: Manoj Singh Gaur, Malaviya National Institute of Technology, India
Conference Co-Chair: Mehmet Orgun, Macquarie University, Australia
Program Chair: Ludmila Babenko, Southern Federal University, Russia
Program Co-Chair: Sadek Ferdous, University of Glasgow, UK
Program Co-Chair: Anthony T.S. Ho, University of Surrey, UK
Program Co-Chair: Vijay Laxmi, Malaviya National Institute of Technology, India
Program Co-Chair: Josef Pieprzyk, Queensland University of Technology, Australia
Tutorials Chair: Evgeny Abramov, Southern Federal University, Russia
Tutorials Co-Chair: Hani Aljahdali, University of Glasgow, UK
Tutorials Co-Chair: Behnam Rahnama, Okan University, Turkey
Tutorials Co-Chair: Dhiren Patel, SVNIT Surat, India
Workshops Chair: Peter Zegzhda, Saint-Petersburg State Polytechnical University, Russia
Workshops Co-Chair: Maria Evangelopoulou, University of Glasgow, UK
Workshops Co-Chair: Hossain Shahriar, Kennesaw State University, USA
Workshops Co-Chair: Chhagan Lal, SKIT, India
Publication Chair: Alexander Chefranov, Eastern Mediterranean University, North Cyprus
Publication Co-Chair: Jaideep Vaidya, Rutgers University, USA
Treasurer: Vladimir Strukov, Southern Federal University, Russia
Registration Chair: Olga Peskova, Southern Federal University, Russia
Local Arrangements Chair: Maxim Anikeev, Southern Federal University, Russia
e-Presence Chair: Ivan Polovko, Southern Federal University, Russia
e-Presence Co-Chair: Muhammet Saygin, Mersin University, Silifke Vocational School, Turkey
Promotion Chair: Maxim Anikeev, Southern Federal University, Russia
Promotion Co-Chair: Alexey Nekrasov, Southern Federal University, Russia
Promotion Co-Chair: Soum Chowdhury, University of Glasgow, UK
Promotion Co-Chair: Duygu Çelik, Istanbul Aydin University, Turkey
Promotion Co-Chair: Parvez Faruki, BPTI, Bhavnagar, India
Liaison for South America: Carlos Becker Westphall, Federal University of Santa Catarina, Brazil
Logo, certificates & covers designs: Efe Cem Elçi, Turkey
Volunteers Team: Nikita Sushkin, Students of IT-Security Department (Southern Federal University,
Russia)
Advisory Committee Members:
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Bülent Örencik, Beykent University, Turkey
Cetin Kaya Koc, University of California Santa Barbara, USA
Edward Dawson, Queensland University of Technology, Australia
Elisa Bertino, Purdue University, USA
N. Balakrishnan, IISc Bangalore, India
Willy Susilo, University of Wollongong, Australia
INTERNATIONAL PROGRAM COMMITTEE
===============================
Full list of the IPC is available at www.sinconf.org.
GENERAL INQUIRIES
=================
For updated information, please refer to www.sinconf.org or the Conference e-mail
sin2015@sinconf.org.
Dated 2015-04-20.

More Related Content

Viewers also liked (6)

Ольга Пестерева, Ростелеком для RIW2014
Ольга Пестерева, Ростелеком для RIW2014Ольга Пестерева, Ростелеком для RIW2014
Ольга Пестерева, Ростелеком для RIW2014
 
Sunu unikop2014-elçi tolunakgünsarıuzun
Sunu unikop2014-elçi tolunakgünsarıuzunSunu unikop2014-elçi tolunakgünsarıuzun
Sunu unikop2014-elçi tolunakgünsarıuzun
 
2013 idee per ripartire
2013 idee per ripartire2013 idee per ripartire
2013 idee per ripartire
 
Masai kultura
Masai kulturaMasai kultura
Masai kultura
 
Masai kultura
Masai kulturaMasai kultura
Masai kultura
 
Masai kultura
Masai kulturaMasai kultura
Masai kultura
 

Similar to SIN2015-CFP

01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
Awais Shibli
 
Bhavin Shah 1.10
Bhavin Shah 1.10Bhavin Shah 1.10
Bhavin Shah 1.10
Bhavin Shah
 
Web Application to Build Information System of National Seminar Alerts in Ind...
Web Application to Build Information System of National Seminar Alerts in Ind...Web Application to Build Information System of National Seminar Alerts in Ind...
Web Application to Build Information System of National Seminar Alerts in Ind...
IJECEIAES
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli
 
HEC Project Proposal_v1.0
HEC Project Proposal_v1.0HEC Project Proposal_v1.0
HEC Project Proposal_v1.0
Awais Shibli
 

Similar to SIN2015-CFP (20)

Dr. SUJATHA RAMAKRISHNAN CURRICULUM VITAE
Dr. SUJATHA RAMAKRISHNAN CURRICULUM VITAEDr. SUJATHA RAMAKRISHNAN CURRICULUM VITAE
Dr. SUJATHA RAMAKRISHNAN CURRICULUM VITAE
 
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
PEARC17: ARCC Identity and Access Management, Security and related topics. Cy...
 
Christo Ananth, Advisory Committee Member, “International Conference On Data ...
Christo Ananth, Advisory Committee Member, “International Conference On Data ...Christo Ananth, Advisory Committee Member, “International Conference On Data ...
Christo Ananth, Advisory Committee Member, “International Conference On Data ...
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
Towards universitas indonesia_next_generation_firewall_service
Towards universitas indonesia_next_generation_firewall_serviceTowards universitas indonesia_next_generation_firewall_service
Towards universitas indonesia_next_generation_firewall_service
 
7th International Conference on Envirotech, Cleantech and Greentech (ECG)
7th International Conference on Envirotech, Cleantech and Greentech (ECG)7th International Conference on Envirotech, Cleantech and Greentech (ECG)
7th International Conference on Envirotech, Cleantech and Greentech (ECG)
 
NTUST Profile
NTUST ProfileNTUST Profile
NTUST Profile
 
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
01_ICT Visit_ Project Briefing and Progress Overview [Dec 26, 13]
 
Bhavin Shah 1.10
Bhavin Shah 1.10Bhavin Shah 1.10
Bhavin Shah 1.10
 
9th leap
9th leap9th leap
9th leap
 
Web Application to Build Information System of National Seminar Alerts in Ind...
Web Application to Build Information System of National Seminar Alerts in Ind...Web Application to Build Information System of National Seminar Alerts in Ind...
Web Application to Build Information System of National Seminar Alerts in Ind...
 
7th International Conference on Researches in Science and Technology (ICRST)
7th International Conference on Researches in Science and Technology (ICRST)7th International Conference on Researches in Science and Technology (ICRST)
7th International Conference on Researches in Science and Technology (ICRST)
 
Modified sd profile june 30
Modified sd profile june 30Modified sd profile june 30
Modified sd profile june 30
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
9th ecg
9th ecg9th ecg
9th ecg
 
9th icrst
9th icrst9th icrst
9th icrst
 
Network Security LabNetwork Security Lab
Network Security LabNetwork Security LabNetwork Security LabNetwork Security Lab
Network Security LabNetwork Security Lab
 
2nd International Conference on Researches in Science and Technology (ICRST)
2nd International Conference on Researches in Science and Technology (ICRST)2nd International Conference on Researches in Science and Technology (ICRST)
2nd International Conference on Researches in Science and Technology (ICRST)
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 
HEC Project Proposal_v1.0
HEC Project Proposal_v1.0HEC Project Proposal_v1.0
HEC Project Proposal_v1.0
 

More from Atilla Elçi (10)

Seng 123 11-imrq
Seng 123 11-imrqSeng 123 11-imrq
Seng 123 11-imrq
 
Seng 123 10-cdst
Seng 123 10-cdstSeng 123 10-cdst
Seng 123 10-cdst
 
Seng 123 9-iid
Seng 123 9-iidSeng 123 9-iid
Seng 123 9-iid
 
Seng 123 8-ooad
Seng 123 8-ooadSeng 123 8-ooad
Seng 123 8-ooad
 
Seng 123 7-sad
Seng 123 7-sadSeng 123 7-sad
Seng 123 7-sad
 
Seng 123 6-pm
Seng 123 6-pmSeng 123 6-pm
Seng 123 6-pm
 
Seng 123 3-sdlc
Seng 123 3-sdlcSeng 123 3-sdlc
Seng 123 3-sdlc
 
Seng 123 2-engineering-swe-ethics
Seng 123 2-engineering-swe-ethicsSeng 123 2-engineering-swe-ethics
Seng 123 2-engineering-swe-ethics
 
Seng 123 1-concepts
Seng 123 1-conceptsSeng 123 1-concepts
Seng 123 1-concepts
 
Seng 123 5-req
Seng 123 5-reqSeng 123 5-req
Seng 123 5-req
 

SIN2015-CFP

  • 1. SIN'15: CALL FOR CONTRIBUTIONS ====================== 8th International Conference on Security of Information and Networks (SIN 2015) 8-10 September 2015 Sochi, Russia www.sinconf.org In Technical Cooperation with ACM Special Interest Group on Security, Audit and Control (SIGSAC) ------------------------- Proceedings by ACM Press; all papers will be inserted into the ACM Digital Library. ------------------------- In succession to the successful SIN 2007 - SIN 2014, the 8th International Conference on Security of Information and Networks (SIN 2015) provides an international forum for presentation of research and applications of security in information and networks. SIN 2015 conference features contributed as well as invited papers, special sessions, workshops, and tutorials on theory and practice. SIN 2015 will feature the following keynote papers and talks: - Ron Poet, The University of Glasgow, UK Title: TBA - Ramki Thurimella, The University of Denver, USA Title: Some New Results in Keyless Jam Resistance Communication (Joint Work with Hamid Hanifi and Leemon Baird) Future SIN Conferences are scheduled to take place in the USA (2016) and Australia (2017). PROPOSALS ================== Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged: development and realization of cryptographic solutions, security schemes, new algorithms; critical analysis of existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cybercrimes such as fraud and phishing; next generation network architectures, protocols, systems and applications; industrial experiences and challenges of the above. Doctoral students are encouraged to propose papers on ongoing research. Original papers will be considered; submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop that has proceedings. All submitted papers will be reviewed by at least three members of the program committee judging its originality, significance, correctness, presentation and relevance. Authors are also encouraged to propose position papers on practical studies and experiments, critique of existing work, emerging issues, and novel ideas under development. Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demo.
  • 2. Proposals of half-day tutorials on fundamental to advanced subjects covering practical implementation aspects of security are welcome. Proposals of special session(s) to be held in the main conference are welcome. Proposals are invited for workshops to be held in conjunction with SIN 2015 Conference. The workshop proposal theme should be closely related to the conference topics. Broad areas of interest in security theory, technology and applications will include, but are not limited to, the following: * Access control and intrusion detection * Security of cyber-physical systems * Autonomous and adaptive security * Security tools and development platforms * Computational intelligence techniques in security * Security ontology, models, protocols & policies * Computer network defense * Standards, guidelines and certification * Cryptographic techniques and key management * Security-aware software engineering * Industrial applications of security * Trust and privacy * Information assurance * Next generation network architectures * Malware analysis * Network security and protocols * Security challenges in Mobile/Embedded Systems * Cloud security * Security Awareness and Education The conference will feature the following special sessions in 2015: * Detecting and Preventing Fraud with Data Analytics * Cybersecurity of Large-Scale and Distributed Systems The details about the special sessions can be found at http://www.sinconf.org/sin2015/index.php/workshops-call-for-workshops SUBMISSION OF PROPOSALS ======================= Papers must be submitted electronically via the SIN 2015 Submission Site at https://cmt.research.microsoft.com/SIN2015/. Title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author should be included. Maximum length for the proceedings is 8 pages for full paper, 4 pages for short paper, 2 pages for fast abstract and position statement, and 2 pages for demo and tutorial proposals. Extra page charges apply. All papers should be written according to double-column ACM conference format (http://www.acm.org/sigs/publications/proceedings-templates). All proposals for organizing workshops, tutorials, demos, and special sessions are expected at the conference e-mail sin2015@sinconf.org.
  • 3. All accepted papers will be published by ACM Press in a conference proceedings and placed into ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue of the International Journal of Information Security and Privacy (IJISP) by IGI Global (http://www.sinconf.org/sin2015/images/docs/IJISP-SIN2015-rev.pdf). Each accepted paper must be registered to be included in the proceedings. Papers not presented during the conference may be removed from the online proceedings. IMPORTANT DATES =============== Please consult www.sinconf.org site for the most up-to-date info on the following: Workshop / Special Session Proposals: 1 March 2015 (passed) Paper Submission by: 11 May 2015 (extended from 20.04.2015) Tutorial Proposal by: 10 May 2015 Tutorial Notification: 20 May 2015 All Author Notification: 15 June 2015 (extended) All Papers Camera Ready by: 1 July 2015 (extended) Author Registration due date: 1 July 2015 (extended) Tutorial Date: 7 September 2015 Conference Dates: 8-10 September 2015 ORGANIZATION & SPONSORS ======================= Organized by ------------ - Southern Federal University, Taganrog, Rostov-on-Don, Russia - The University of Glasgow, Glasgow, UK - Aksaray University, Aksaray, Turkey - Malaviya National Institute of Technology, Jaipur, India - Macquarie University, Sydney, Australia Supported by ------------ Russian Foundation for Basic Research Southern Federal University, Russia (pending) Sponsored by ------------ NeoBIT LLC, St. Petersburg, Russia NPO Echelon, Moscow, Russia Hosted by --------- Department of Security of Information Technologies and South-Russian Regional Scientific- Educational Center for Information Security Problems, Southern Federal University, Taganrog, Rostov-on-Don, Russia Venue -----
  • 4. Marins Park Hotel Sochi; 2, Morskoy lane, Sochi, Krasnodar Region, 354000, Russia ORGANIZATION COMMITTEE ===================== Honorary Chair: Marina Borovskaya, Rector of Southern Federal University, Russia Conference Chair: Oleg Makarevich, Southern Federal University, Russia Conference Co-Chair: Ron Poet, University of Glasgow, UK Conference Co-Chair: Atilla Elci, Aksaray University, Turkey Conference Co-Chair: Manoj Singh Gaur, Malaviya National Institute of Technology, India Conference Co-Chair: Mehmet Orgun, Macquarie University, Australia Program Chair: Ludmila Babenko, Southern Federal University, Russia Program Co-Chair: Sadek Ferdous, University of Glasgow, UK Program Co-Chair: Anthony T.S. Ho, University of Surrey, UK Program Co-Chair: Vijay Laxmi, Malaviya National Institute of Technology, India Program Co-Chair: Josef Pieprzyk, Queensland University of Technology, Australia Tutorials Chair: Evgeny Abramov, Southern Federal University, Russia Tutorials Co-Chair: Hani Aljahdali, University of Glasgow, UK Tutorials Co-Chair: Behnam Rahnama, Okan University, Turkey Tutorials Co-Chair: Dhiren Patel, SVNIT Surat, India Workshops Chair: Peter Zegzhda, Saint-Petersburg State Polytechnical University, Russia Workshops Co-Chair: Maria Evangelopoulou, University of Glasgow, UK Workshops Co-Chair: Hossain Shahriar, Kennesaw State University, USA Workshops Co-Chair: Chhagan Lal, SKIT, India Publication Chair: Alexander Chefranov, Eastern Mediterranean University, North Cyprus Publication Co-Chair: Jaideep Vaidya, Rutgers University, USA Treasurer: Vladimir Strukov, Southern Federal University, Russia Registration Chair: Olga Peskova, Southern Federal University, Russia Local Arrangements Chair: Maxim Anikeev, Southern Federal University, Russia e-Presence Chair: Ivan Polovko, Southern Federal University, Russia e-Presence Co-Chair: Muhammet Saygin, Mersin University, Silifke Vocational School, Turkey Promotion Chair: Maxim Anikeev, Southern Federal University, Russia Promotion Co-Chair: Alexey Nekrasov, Southern Federal University, Russia Promotion Co-Chair: Soum Chowdhury, University of Glasgow, UK Promotion Co-Chair: Duygu Çelik, Istanbul Aydin University, Turkey Promotion Co-Chair: Parvez Faruki, BPTI, Bhavnagar, India Liaison for South America: Carlos Becker Westphall, Federal University of Santa Catarina, Brazil Logo, certificates & covers designs: Efe Cem Elçi, Turkey
  • 5. Volunteers Team: Nikita Sushkin, Students of IT-Security Department (Southern Federal University, Russia) Advisory Committee Members: Bart Preneel, Katholieke Universiteit Leuven, Belgium Bülent Örencik, Beykent University, Turkey Cetin Kaya Koc, University of California Santa Barbara, USA Edward Dawson, Queensland University of Technology, Australia Elisa Bertino, Purdue University, USA N. Balakrishnan, IISc Bangalore, India Willy Susilo, University of Wollongong, Australia INTERNATIONAL PROGRAM COMMITTEE =============================== Full list of the IPC is available at www.sinconf.org. GENERAL INQUIRIES ================= For updated information, please refer to www.sinconf.org or the Conference e-mail sin2015@sinconf.org. Dated 2015-04-20.