Call for Papers

Authors should e-mail extended abstracts of their proposed paper to Jaroslav Dočkal ( by February 27th, 2015. The extended abstract length must be 250-600 words. Please enter "SPI 2015" in the e-mail subject field. All abstracts should include the speaker's name and title.

Abstracts must be in English. Kindly ensure that the abstract portrays the author's intent clearly and that it is an accurate reflection of the final paper. Also include the author's affiliation, address, phone/fax numbers and e-mail. You will receive a response to your submission by March 16th, 2015.

After notification of the paper's acceptance, authors will receive detailed instructions about the formal preparation of the manuscript. The deadline for camera-ready copies is April 13th, 2015. Please use the e-mail address for all correspondence.

A maximum of 10 pages will be accepted. The time allotted for one speech is 15 minutes max. The conference program will be distributed by April 30th, 2015. Proceedings will have an ISBN.

The conference organizers have asked for the inclusion of peer-reviewed papers from the conference to SCOPUS.

Important dates

Abstract submission: 27. 2. 2015
Notification of acceptance/rejection: 16. 3. 2015
Paper submission: 13. 4. 2015
Determination of the conference program:      30. 4. 2015

Invited speakers

Muttukrishnan Rajarajan – How do we Trust the Cloud when we know nothing about it?

Radim Polčák – Strategic issues in the eimplementation of European and national legal regulatory framework of cybersecurity

Tomáš Rosa – Coping with the Paradigm Twist in Between Algebraic Cryptology and Stochastic Biometrics

Vlastimil Klíma, Martin Baroš – Data Protection in Clouds

Program Committee

  • Jaroslav Dočkal, Ph.D., (Committee Chair)
    Karel Englis College, Czech Republic;
  • Daniel Cvrček, Ph.D.,
    independent consultant, Czech Republic;
  • Steven M. Furnell, BSc(Hons), Ph.D., CEng, FBCS, CITP, SMIEEE, MInstISP, Plymouth University, Great Britain;
  • Ltc. Ladislav Hagara, Ph.D.,
    University of Defence, Czech Republic;
  • Josef Kaderka, Ph.D.,
    University of Defence, Czech Republic;
  • Lukáš Kypus,
    Czech Technical University in Prague;
  • Václav Matyáš, M.Sc., Ph.D.,
    Masaryk University Brno, Czech Republic;
  • Daniel Olejár, Ph.D.,
    Comenius University in Bratislava, Slovakia;
  • Zdeněk Říha, Ph.D.,
    Masaryk University Brno, Czech Republic;
  • Dimitrios N. Serpanos, Ph.D.,
    Qatar Computing Research Institute (QCRI), Qatar.

SPI is an annual conference that brings together researchers and practitioners to provide a confluence of new information security technologies and their applications.

Objectives of the conference

  • Extending the tradition of exchanging knowledge and experiences of IT security between participants from the Czech Republic and abroad, from military, industry and academia, as established by the 2001, 2003, 2005, 2007, 2009 and 2011 SPI conferences.
  • Meet leadings world and Czech experts in the ICT security area.
  • Provide a wide forum for exchange of information. The open forum of the conference is an excellent opportunity to establish contacts with colleagues from different regions. The social program is therefore an important part of the conference.

Areas of interest include, but are not limited to:

New Approaches to Security and Protection of Information

  • security policy in government administration
  • development and application standards in security
  • vulnerabilities, risk management, incident response, patch management
  • mobile management and security convergence
  • forensic discovery of computers and computer networks
  • security economics
  • cloud computing security (the main topic of the conference)
  • big data security
  • business continuity planning, disaster recovery
  • identity, access and authorization management
  • data loss prevention
  • application of electronic signature and PKI
  • biometrics
  • personnel security and protection programs
  • security solution for virtualization

Computer Network Security

  • security threats, hacker activities, incident handling
  • TCP/IP protocol suite security, secure routing
  • VoIP, IT telephony and WiFi security
  • secure directories, e-mail, DNS, and web security
  • firewalls, VPNs, intruder detection and prevention systems
  • secure programming
  • anti-virus protection

Applied Cryptography

  • cryptographic applications
  • cryptoanalysis
  • cryptographic algorithms, their design and implementation
  • modularity and re-use of critical components
  • cryptographic standards
  • cryptography and legislation
  • privacy enhancing technologies
  • provable security
  • RFID - security and cryptography aspects, etc.

Information Security in Military Environments

  • multilevel system security
  • security policy, procedures and regulation
  • securing operating and database systems
  • technological questions of computer security
  • PKI in military environments
  • secure multicast conferencing
  • security problem scenarios, security education and training