<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=iso-8859-9"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
span.E-postaStili17
{mso-style-type:personal;
font-family:"Calibri","sans-serif";
color:windowtext;}
span.E-postaStili18
{mso-style-type:personal;
font-family:"Calibri","sans-serif";
color:#1F497D;}
span.E-postaStili19
{mso-style-type:personal;
font-family:"Calibri","sans-serif";
color:#1F497D;}
span.E-postaStili20
{mso-style-type:personal;
font-family:"Calibri","sans-serif";
color:#1F497D;}
span.E-postaStili21
{mso-style-type:personal-reply;
font-family:"Calibri","sans-serif";
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:70.85pt 70.85pt 70.85pt 70.85pt;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><span style='color:#1F497D'>Dear Colleagues, <o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'>FYI</span><span style='color:#1F497D'>,</span><span style='color:#1F497D'> SIN’13 update in terms of Phase 2 submission deadline and keynote speakers are appended below.<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><o:p> </o:p></span></p><p class=MsoNormal>CALL FOR CONTRIBUTIONS<o:p></o:p></p><p class=MsoNormal>====================== <o:p></o:p></p><p class=MsoNormal>The 6th International Conference on Security of Information and Networks (SIN’13) <o:p></o:p></p><p class=MsoNormal>November 26-28, 2013, Aksaray, Turkey<o:p></o:p></p><p class=MsoNormal><a href="http://www.sinconf.org">www.sinconf.org</a><o:p></o:p></p><p class=MsoNormal>---------------<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>In Technical Cooperation with ACM / SIGSAC. Proceedings by ACM Press and ACM Digital Library.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Keynotes by: <o:p></o:p></p><p class=MsoNormal>Georges ATAYA, Ali AYDIN, Lyudmila BABENKO, Bart PRENEEL, Erkay SAVAŞ, Rudrapatna SHYAMASUNDAR, Edgar WEIPPL.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Papers, special sessions, tutorials, and workshops addressing all aspects of security in information and networks are being sought. Researchers and industrial practitioners working on the following and related subjects are especially encouraged: Development and realization of cryptographic solutions, security schemes, new algorithms; critical analysis of existing approaches; secure information systems, especially distributed control and processing applications, and security in networks; interoperability, service levels and quality issues in such systems; information assurance, security, and public policy; detection and prevention of cybercrimes such as fraud and phishing; next generation network architectures, protocols, systems and applications; industrial experiences and challenges of the above.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Topics of Interest: <o:p></o:p></p><p class=MsoNormal>-------------------<o:p></o:p></p><p class=MsoNormal>Possible topics include:<o:p></o:p></p><p class=MsoNormal>• Access control and intrusion detection<o:p></o:p></p><p class=MsoNormal>• Cyber Physical Systems<o:p></o:p></p><p class=MsoNormal>• Autonomous and adaptive security <o:p></o:p></p><p class=MsoNormal>• Security tools and development platforms<o:p></o:p></p><p class=MsoNormal>• Computational intelligence techniques in security <o:p></o:p></p><p class=MsoNormal>• Security ontology, models, protocols & policies<o:p></o:p></p><p class=MsoNormal>• Computer network defense <o:p></o:p></p><p class=MsoNormal>• Standards, guidelines and certification<o:p></o:p></p><p class=MsoNormal>• Cryptographic techniques and key management <o:p></o:p></p><p class=MsoNormal>• Security-aware software engineering<o:p></o:p></p><p class=MsoNormal>• Industrial applications of security <o:p></o:p></p><p class=MsoNormal>• Trust and privacy<o:p></o:p></p><p class=MsoNormal>• Information assurance<o:p></o:p></p><p class=MsoNormal>• Cyber Warfare (attacks and defenses)<o:p></o:p></p><p class=MsoNormal>• Next generation network architectures <o:p></o:p></p><p class=MsoNormal>• Malware analysis<o:p></o:p></p><p class=MsoNormal>• Network security and protocols <o:p></o:p></p><p class=MsoNormal>• Security challenges in Mobile/Embedded Systems<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Proposal submission: <o:p></o:p></p><p class=MsoNormal>--------------------<o:p></o:p></p><p class=MsoNormal>Papers should include the title, author's name(s), affiliation, mailing address, telephone, fax and email of the principal author. All papers will be reviewed by at least three members of the reviewers judging their originality, significance, correctness, presentation and relevance. Acceptance and final category depend on reviewer feedback. All accepted papers will be published by ACM Press in the conference proceedings and placed into the ACM Digital Library. Extended versions of selected papers will be invited for possible publication in a special issue of an international journal (TBA). The submitted papers should be written according to double-column ACM conference format (<a href="http://www.acm.org/sigs/publications/proceedings-templates">http://www.acm.org/sigs/publications/proceedings-templates</a>). All papers, special session, tutorial, and workshop proposals must be submitted electronically via the SIN 2013 Submission Site (<a href="https://cmt.research.microsoft.com/SIN2013/">https://cmt.research.microsoft.com/SIN2013/</a>). <o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Paper categories:<o:p></o:p></p><p class=MsoNormal>-----------------<o:p></o:p></p><p class=MsoNormal>• Research contributions - Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted simultaneously to any other conference or workshop that has published proceedings. Maximum length for the proceedings is 8 pages for full papers, 4 pages for short papers.<o:p></o:p></p><p class=MsoNormal>• Student contributions - Doctoral / Masters Students are encouraged to propose papers on ongoing research. Please add "(Student contribution)" to the title. Maximum length for the proceedings is 4 pages for student papers.<o:p></o:p></p><p class=MsoNormal>• Industrial contributions - Authors from industry and government enterprises are welcome to submit original papers that describe their experiences, challenges, and applications in security. Maximum length for the proceedings is 8 or 5 pages.<o:p></o:p></p><p class=MsoNormal>• Position papers / fast abstracts - Authors are also encouraged to propose position papers / fast abstracts on practical studies and experiments, critiques of existing work, emerging issues, and novel ideas under development. Maximum length for the proceedings is 2 pages for fast abstracts and position statements.<o:p></o:p></p><p class=MsoNormal>• Tool demos - Enterprises and research centers developing, implementing, or using security tools and frameworks are encouraged to propose application / tool demos. Maximum length for the proceedings is 4 pages for tool demos.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Important Due Dates:<o:p></o:p></p><p class=MsoNormal>--------------------<o:p></o:p></p><p class=MsoNormal>Paper Submission: July 31, 2013 (Phase 2) <o:p></o:p></p><p class=MsoNormal>Tutorial Proposal: June 30, 2012(Phase 1, soft d/l)<o:p></o:p></p><p class=MsoNormal>Notification: August 31, 2013<o:p></o:p></p><p class=MsoNormal>Camera Ready & Author Registration: September 20, 2013 <o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Organization Committee:<o:p></o:p></p><p class=MsoNormal>-----------------------<o:p></o:p></p><p class=MsoNormal>Conference Chairs:<o:p></o:p></p><p class=MsoNormal>------------------<o:p></o:p></p><p class=MsoNormal>Atilla Elçi, Aksaray University, Turkey<o:p></o:p></p><p class=MsoNormal>Manoj Singh Gaur, Malaviya National Institute of Technology, India <o:p></o:p></p><p class=MsoNormal>Mehmet Orgun, Macquarie University, Australia<o:p></o:p></p><p class=MsoNormal>Oleg Makarevich, Southern Federal University, Russia<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Program Chairs:<o:p></o:p></p><p class=MsoNormal>---------------<o:p></o:p></p><p class=MsoNormal>Alexander Chefranov, Eastern Mediterranean Univ., North Cyprus<o:p></o:p></p><p class=MsoNormal>Vijay Laxmi, Malaviya National Institute of Technology, India<o:p></o:p></p><p class=MsoNormal>Josef Pieprzyk, Macquarie University, Australia<o:p></o:p></p><p class=MsoNormal>Ludmila Babenko, SFedU, Taganrog, Rostov, Russia<o:p></o:p></p><p class=MsoNormal>Berna Örs Yalçın, Istanbul Technical University, Turkey<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Organized by:<o:p></o:p></p><p class=MsoNormal>-------------<o:p></o:p></p><p class=MsoNormal>• Department of Electrical & Electronics Engineering, Aksaray University, Aksaray, Turkey<o:p></o:p></p><p class=MsoNormal>• Department of Computer Engineering, Malaviya National Institute of Technology Jaipur<o:p></o:p></p><p class=MsoNormal>• The Centre for Advanced Computing - Algorithms and Cryptography (ACAC) & The Information and Networked Systems Security<o:p></o:p></p><p class=MsoNormal>(INSS) & Intelligent Systems Group (ISG), Dept. of Computing, Macquarie University, Sydney, Australia<o:p></o:p></p><p class=MsoNormal>• Department of Security of Information Technologies, South-Russian Regional Scientific-Educational Center for Information Security<o:p></o:p></p><p class=MsoNormal>Problems, Southern Federal University, Taganrog, Rostov, Russia<o:p></o:p></p><p class=MsoNormal>• Department of Electronics and Communication Engineering, Istanbul Technical University, Istanbul, Turkey<o:p></o:p></p><p class=MsoNormal>• Ahiler Development Agency, Nevsehir, Turkey<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Hosted By: <o:p></o:p></p><p class=MsoNormal>----------<o:p></o:p></p><p class=MsoNormal>Aksaray University, Aksaray, Turkey<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><span style='color:#1F497D'>Cheers,</span><span lang=TR style='color:#1F497D'><o:p></o:p></span></p><p class=MsoNormal><span lang=TR style='color:#1F497D'>Atilla Elci, Ph.D.<o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><a href="http://eem.aksaray.edu.tr/">http://eem.aksaray.edu.tr/</a><o:p></o:p></span></p><p class=MsoNormal><a href="http://sdiwc.net/conferences/2013/taeece2013/keynote-speakers/">http://sdiwc.net/conferences/2013/taeece2013/keynote-speakers/</a><span lang=TR style='color:#1F497D'><o:p></o:p></span></p><p class=MsoNormal><span lang=TR style='color:#1F497D'><a href="http://member.acm.org/~aelci">http://member.acm.org/~aelci</a><o:p></o:p></span></p><p class=MsoNormal><span lang=TR style='color:#1F497D'><a href="http://aksaray.academia.edu/AtillaEl%C3%A7i">http://aksaray.academia.edu/AtillaEl%C3%A7i</a><o:p></o:p></span></p><p class=MsoNormal><span lang=TR style='color:#1F497D'><a href="http://lnkd.in/i4RAxn">http://lnkd.in/i4RAxn</a><o:p></o:p></span></p><p class=MsoNormal><span lang=TR style='color:#1F497D'><a href="http://scholar.google.com/citations?hl=en&user=wpQvtlQAAAAJ">http://scholar.google.com/citations?hl=en&user=wpQvtlQAAAAJ</a><o:p></o:p></span></p><p class=MsoNormal><span style='color:#1F497D'><a href="http://www.informatik.uni-trier.de/~ley/db/conf/sin/sin2012.html"><span lang=TR>http://www.informatik.uni-trier.de/~ley/db/conf/sin/sin2012.html</span></a></span><span lang=TR style='color:#1F497D'><o:p></o:p></span></p><p class=MsoNormal><span lang=TR style='color:#1F497D'>SIN’13: <a href="http://www.sinconf.org/sin2013/">www.sinconf.org/sin2013/</a><o:p></o:p></span></p><p class=MsoNormal><span lang=TR style='color:#1F497D'>SIN’13 LinkedIn: <a href="http://www.linkedin.com/groups/SIN13-6th-Intl-Conf-on-4812866">http://www.linkedin.com/groups/SIN13-6th-Intl-Conf-on-4812866</a> <o:p></o:p></span></p><p class=MsoNormal><span lang=TR style='color:#1F497D'>SIN’13 FB: <a href="http://www.facebook.com/sinconf2013">http://www.facebook.com/sinconf2013</a> <o:p></o:p></span></p><p class=MsoNormal><span lang=TR style='color:#1F497D'>IGI CRYPSIS Book: <a href="http://tinyurl.com/d8wg7l2">http://tinyurl.com/d8wg7l2</a><o:p></o:p></span></p><p class=MsoNormal><span lang=TR style='color:#1F497D'>Springer Book: <a href="http://tinyurl.com/ESAS-book">http://tinyurl.com/ESAS-book</a><o:p></o:p></span></p><p class=MsoNormal><span lang=TR style='color:#1F497D'>ICPCA/SWS'12 Proc.: <a href="http://link.springer.com/book/10.1007/978-3-642-37015-1/page/1">http://link.springer.com/book/10.1007/978-3-642-37015-1/page/1</a><o:p></o:p></span></p><p class=MsoNormal><o:p> </o:p></p></div></body></html>