Call for Papers

Authors should e-mail extended abstracts of their proposed paper to Jaroslav Dočkal (jdockal.spi@gmail.com) by February 27th, 2017. The extended abstract length must be 250-600 words. Please enter "SPI 2017" in the e-mail subject field. All abstracts should include the speaker's name and title.

Abstracts must be in English. Kindly ensure that the abstract portrays the author's intent clearly and that it is an accurate reflection of the final paper. Also include the author's affiliation, address, phone/fax numbers and e-mail. You will receive a response to your submission by March 16th, 2017.

After notification of the paper's acceptance, authors will receive detailed instructions about the formal preparation of the manuscript. The deadline for camera-ready copies is April 13th, 2017. Please use the e-mail address jdockal.spi@gmail.com for all correspondence.

A maximum of 10 pages will be accepted. The time allotted for one speech is 15 minutes max. The conference program will be distributed by April 30th, 2017. Proceedings will have an ISBN.

The conference organizers have asked for the inclusion of peer-reviewed papers from the conference to SCOPUS.

Scientific papers will be included in the electronic magazine of the same name, which is included in the ERIH PLUS database.

Important dates

Abstract submission: 27. 2. 2017
Notification of acceptance/rejection: 16. 3. 2017
Paper submission: 13. 4. 2017
Determination of the conference program:      30. 4. 2017

Invited speakers

Program Committee

  • Jaroslav Dočkal, Ph.D., (Committee Chair)
    Karel Englis College, Czech Republic;
  • Daniel Cvrček, Ph.D.,
    independent consultant, Czech Republic;
  • Steven M. Furnell, BSc(Hons), Ph.D., CEng, FBCS, CITP, SMIEEE, MInstISP, Plymouth University, Great Britain;
  • Ltc. Ladislav Hagara, Ph.D.,
    University of Defence, Czech Republic;
  • Josef Kaderka, Ph.D.,
    University of Defence, Czech Republic;
  • Lukáš Kypus,
    Czech Technical University in Prague;
  • Václav Matyáš, M.Sc., Ph.D.,
    Masaryk University Brno, Czech Republic;
  • Daniel Olejár, Ph.D.,
    Comenius University in Bratislava, Slovakia;
  • Zdeněk Říha, Ph.D.,
    Masaryk University Brno, Czech Republic;
  • Dimitrios N. Serpanos, Ph.D.,
    Industrial Systems Institute and University of Patras, Greece;
  • Mgr. David C. Hajicek, LL.M., University of Economics in Prague, Czech Republic.

SPI is an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies and their applications.

Objectives of the conference

  • Extending the tradition of exchanging knowledge and experiences of IT security between participants from the Czech Republic and abroad, from military, industry and academia, as established by the 2001, 2003, 2005, 2007, 2009, 2011, 2013 and 2015 SPI conferences.
  • Meet leadings world and Czech experts in the ICT security area.
  • Provide a wide forum for exchange of information. The open forum of the conference is an excellent opportunity to establish contacts with colleagues from different regions. The social program is therefore an important part of the conference.

Areas of interest include, but are not limited to:

New Approaches to Security and Protection of Information

  • Cybersecurity for Industry 4.0
  • IoT security
  • penetration testing
  • security policy in government administration
  • development and application standards in security
  • vulnerabilities, risk management, incident response, patch management
  • mobile management and security convergence
  • forensic discovery of computers and computer networks
  • security economics
  • cloud computing security
  • big data security
  • business continuity planning, disaster recovery
  • identity, access and authorization management
  • data loss prevention
  • application of electronic signature and PKI
  • biometrics
  • personnel security and protection programs
  • security solution for virtualization

Computer Network Security

  • security threats, hacker activities, incident handling
  • TCP/IP protocol suite security, secure routing
  • VoIP, IT telephony and WiFi security
  • secure directories, e-mail, DNS, and web security
  • firewalls, VPNs, intruder detection and prevention systems
  • secure programming
  • antimalware protection

Applied Cryptography and Cryptoanalytics

  • cryptographic applications
  • cryptoanalysis
  • cryptographic algorithms, their design and implementation
  • modularity and re-use of critical components
  • cryptographic standards
  • cryptography and legislation
  • privacy enhancing technologies
  • provable security
  • RFID - security and cryptography aspects, etc.

Information Security in Military Environments

  • multilevel system security
  • security policy, procedures and regulation
  • securing operating and database systems
  • technological questions of computer security
  • PKI in military environments
  • secure multicast conferencing
  • security problem scenarios, security education and training