3rd IFIP International Workshop on
Security and Cognitive Informatics for Homeland Defense
September 2-6, 2013, University of Regensburg, Germany
In conjunction with ARES 2013
(1) The CD-ARES 2013 Proceedings published as LNCS 8128.
(2) Dr. Roberto De Prisco will give the keynote titled "Visual Cryptography: An Overview".
(3) The SeCIHD 2013 program is available here
(4) Submission Deadline is EXTENDED to: April 30, 2013 (HARD DEADLINE)
(5) The SeCIHD 2013 website opens!
Security subjects are becoming hugely important in the light of the development and deployment of new Homeland Defense solutions. Such solutions require the design of new computer systems and techniques allowing security procedures to be executed on many different planes, from system, communication and organization security to the security of the state and ensuring its defense capabilities. Advanced IT technologies based on intelligent algorithms that can analyze group behavior and interpret complex patterns or situations are increasingly frequently becoming the building blocks of the above solutions. In this context, it is worth noting research that combines security and defense aspects with achievements in designing advanced systems for the acquisition and sophisticated semantic analysis of complex image patterns and group behaviors. Such systems use cognitive models of semantic interpretation and can be applied to develop e.g. algorithms and protocols used for the security of computer systems themselves, but also to ensure the confidentiality and security of communication networks. They can also be employed to develop globally understood safe solutions connected with activities to strengthen national defense capability.
Aims and scope
The aim of this workshop is collecting and discussing new ideas and solutions that can be used to develop globally understood safe solutions connected with activities to strengthen national defense capability.
The event is aimed at both industry professionals and research/academic audience. Professionals will gain knowledge about basic concepts in Homeland defense, and become capable to manage defensive response capabilities. Researchers and academics will develop together with industry professionals the new solutions, technologies and security instruments that underpin international peace and security into the electronic age.
## Topics (included, but are not limited to)
- Homeland Security and Information Processing.
- Investigative and Computer System Related Forensic Techniques, Trends and Methods.
- Network Forensics, Wireless and Mobile Forensics.
- Cyber-Defense Threat Analysis.
- Emergency Management, Including Prevention, Planning, Response, and Recovery.
- Secure Communications, Cyber-Attack Countermeasures.
- Vulnerability Analysis and Countermeasures.
- Anomaly Detection.
- Information Sharing and Secrecy.
- Cryptographic Models for Homeland Defense.
- Personal Security and Biometric.
- Intelligent Robots and Unmanned Vehicles.
- Target and Pattern Recognition.
- Sensor and Data Analysis.
- Semantic Image and Data Processing.
- Information Fusion.
- Emerging Threats in Intelligent Energy Systems.
- Advanced Vision Algorithms.
- Security and Privacy in Ambient Intelligence.
- Context and Location-aware Computing.
- Embedded Systems in Security.
- Knowledge-based Systems for Internet Security.
- Security Issues and Protocols for Internet Services.
- Privacy and Trust for Internet Services.
- Artificial Intelligence and Computational Intelligence.
- Cognitive Informatics.
- Security and Privacy in Power-Grid Systems.
- Cognitive Models of the Brain.
- Mathematical Foundations of Computing and Cryptography.
- Biologically Inspired Information Systems and Secret Data Management.
- Cognitive Image and Scene Understanding.
- Intelligent Health Technologies.
April 15th, 2013 April 30th, 2013 (EXTENDED)
- Author Notification: May 20th, 2013
- Author Registration: June 1st, 2013
- Proceedings Version: June 11th, 2013
SeCIHD 2013 welcomes special sessions which will be composed of at least 4 papers.:
**** General Chairs
You (Korean Bible University, Republic of Korea)
Fang-Yie Leu (Tunghai University, Taiwan)
**** General Vice-Chairs
Francesco Palmieri (Second University of Naples, Italy)
Ugo Fiore (University of Naples “Federico II”, Italy)
**** Program Co-Chairs
Castiglione (University of Salerno, Italy)
Marek Ogiela (AGH University of Science and Technology, Poland)
Giovanni Acampora (TU/e, Eindhoven University of Technology, The Netherlands)
Christina Alcaraz (University Malaga, Spain)
Joonsang Baek (Khalifa University of Science, Technology & Research, UAE)
Francesca Bosco (United Nations Interregional Crime and Justice Research Institute, Italy)
Antonio Colella (Italian Army, Italy)
Gabriele Costa (University of Genoa, Italy)
Christian Czosseck (Estonian Business School, Estonia)
Bonaventura D'Alessio (Carabinieri Specialist Mobile Unit Command, Italy)
Massimo Ficco (Second University of Naples, Italy)
Alessandro Gigante (European Space Agency, ESRIN Health, Safety and Security Officer, Italy)
Tomasz Hachaj (Pedagogical University in Krakow, Poland)
Leonardo Impagliazzo (Vice President, Engineering Signalling Busines Unit, AnsaldoSTS, Italy)
Shinsaku Kiyomoto (KDDI R&D Laboratories Inc., Japan)
Giovanni Motta (Google Inc., USA)
Jordi Nin (Universitat Politènica de Catalunya, Barcelona, Spain)
Kyung-Hyune Rhee (Pukyong National University, Republic of Korea)
Sergio Ricciardi (Universitat Politènica de Catalunya, Barcelona, Spain)
Alessandra Sala (Bell Labs, Ireland)
Germán Santos-Boada (Universitat Politècnica de Catalunya, Barcelona, Spain)
Athanasios V. Vasilakos (University of Western Macedonia, Greece)
Shuichiro Yamamoto (Nagoya University, Japan)
Toshihiro Yamauchi (Okayama University, Japan)
Siu Ming Yiu (The University of Hong Kong, HK)
Wei Yu (Towson University, USA)
[Additional members still being invited]
Authors are invited to submit original papers: they must not substantially duplicate work that any of the authors have published elsewhere or have submitted in parallel to any other conferences that have proceedings.
Submissions must be in English and conform to the "Springer LNCS Series" format.
Please use the LNCS templates and style files available from
for templates (MS Word or Latex only).
The proceedings of the workshop will be published by Springer LNCS.
Submissions must not exceed more than 16 pages, including tables and figures, and must be in PDF only. Submission of a paper implies that should the paper be accepted, at least one of the authors will register and present the paper at the workshop.
Each paper needs to be submitted to the workshop via the easychair:
When you will submit your paper at the system,
please make sure of checking the group “Regular Session”.
Proceedings of the workshop will be published by Springer Lecture Notes in Computer Science (LNCS) with IFIP logo (indexed by EI, Scopus, DBLP). The proceedings will be available at the workshop. At least one author of an accepted paper must register at the ARES 2013 site and present the paper at the workshop.
- Title: Visual Cryptography: An Overview
- Abstract: Secret sharing allows the sharing of a secret among a set of participants in such a way that only some (qualified) subsets of participants can recover the secret while all other (forbidden) subsets have no information about the secret. Visual Cryptography is a special type of secret sharing in which the secret is an image, the shares are images printed on transparencies and the reconstruction process is the superposition of the shares. Visual Cryptography has been introduced by Kafri and Keren (1987) and Naor and Shamir (1984). After the paper by Naor and Shamir a large number of papers have studied several aspects of the problem. Three different models have been used: the random grid model, the deterministic model and the probabilistic model. Lower bounds, constructions of schemes, generalizations and extensions have been studied. In this talk we will give a survey of the field focusing on the relations between the models, providing an account of the most important results and presenting novel insights regarding the relations among the three models.
- Speaker: Dr. Roberto De Prisco (Associate Professor, The University of Salerno, Italy)
Roberto De Prisco is associate professor of Computer Science in the "Dipartimento di Informatica" of the University of Salerno, Italy. Roberto got his PhD from the Massachusetts Institute of Technology in 2000. At MIT he has been Research and Teaching assistant from 1995 through 2000. In 1998 Roberto has been a member of the Secure Systems Research Department at AT&T Labs-Research, Florham Park, NJ. In 2000 and 2001 he has been Research Scientist at Akamai Technologies, working in the Distributed Data Collection group. Currently he is a member of the Akamai Faculty Group. He got his current associate professor position in 2001. His research interests are focused in the areas of algorithms, distributed systems, cryptography and security. Roberto is also interested in Music. He got a 10-year "Diploma" of Pianoforte from the Music Conservatory of Salerno, Italy. He leads the Musimathics laboratory at the University of Salerno where research across the fields of music and computer science is fostered. He his author of more than 50 scientific papers published in international journals and conferences. He has served as referee for international journals and conferences, as editor and has conference organizer in several occasions. Beside the scientific activity Roberto is also an active non-professional musician. He regularly plays the piano in the tango sextet 30inTango, the alto sax with the Jazz Orchestra and sings in the a cappella pop choir Coro Pop; all of these music groups are groups of the music association "Musicateneo" of the University of Salerno.
- SeCHID 2012 (in conjunction with ARES 2012), University of Economics in Prague, Czech Republic, August 2012
- SeCHID 2011 (in conjunction with ARES 2011), Vienna, Austria, August 2011
For further information regarding the workshop and paper submission,
please contact Prof. Ilsun You at email@example.com
In Cooperation With