IFIP TC11 Information Security & Privacy Conference (SEC)
Past conferences
SEC conferences are the flagship events of the International Federation for Information Processing (IFIP) Technical Committee 11 (TC11) on Information Security and Privacy Protection in Information Processing Systems. Proceedings from this conference series can be found through our publisher Springer under the International Conference on ICT Systems Security and Privacy Protection series.
Please reach out if you have any information in relation to our historic events to help complete our records.
View our past conference series:
2025+ (40th+) | 2015-2024 (30th-39th) | 2005-2014 (20th-29th) | 1994-2004 (10th-19th) | 1983-1993 (1st-9th)
19th Conference, Toulouse, France, 22-27 August 2004
Co-located events
-
IFIP World Computer Congress (WCC 2004)
WG11.1 10th Working Conference on Information Security Management (WISM)
WG11.4 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems (I-NetSec )
WG11.7 Security and Control of Society Workshop
WG11.8 Workshop on Information Security Education (WISE)
Proceedings
-
"Security and Protection in Information Processing Systems"
35 papers
ISBN: 1-4020-8142-1
Editors
-
Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wang
Keynote Speakers
-
Jean-Jacques Quisquater (KBA Award)
Secure Sensors for Smarts Censors? -- Moore's low for Fahrenheit 1984?
18th Conference, Athens, Greece, 26-28 May 2003
Co-located events
-
WG11.1 Workshop on Information Security Management (WISM)
WG11.2 Workshop on Small Systems Security (WSSS)
WG11.4 Workshop on Privacy and Anonymity in Network & Distributed Systems (INETSEC)
WG11.7 Workshop on Security and Control of IT in Society (SCITS)
Proceedings
-
"Security and Privacy in the Age of Uncertainty"
33 papers
6 papers for WISM
7 papers for WSSS
3 papers for INETSEC
2 papers for SCITS
ISBN: 978-0-387-35691-4
Editors
-
Dimitris Gritzalis, Sabrina de Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas
Keynote Speakers
-
Roger Needham (KBA Award)
At the closing ceremony of the IFIP SEC 2003 conference on 28 May in Athens, Greece it was announced that Professor Roger Needham was the 2003 recipient of IFIP TC-11's Kristian Beckman Award.
Sadly, Roger Needham passed away on 1 March 2003. Well known from Cambridge University and Microsoft Research, he contributed broadly to computer science and security. A web page still exists with links to various resources including his published materials.
-
T. Autret (Ernst & Young)
The electronic citizen
17th Conference, Cairo, Egypt, 07-09 May 2002
Proceedings
-
"Security in the Information Society: Visions and Perspectives"
45 papers
ISBN: 978-0-387-35586-3
Editors
-
M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan
Keynote Speakers
-
Professor William J Caelli (KBA Award)
Trusted .or . Trustworthy : The Search for a New Paradigm for Computer and Network Security
15th Conference, Beijing, China, 22-24 August 2000
Co-located events
-
IFIP World Computer Congress (WCC 2000)
Proceedings
-
"Information Security for Global Information Infrastructures"
50 papers (plus 2 invited papers)
ISBN: 978-0-387-35515-3
Editors
-
Sihan Qing, Jan H.P. Eloff
Keynote Speakers
-
Xuejia Lai
Public Key Infrastructure: managing the e-Business security
-
Yiqun Lisa Yin
On the Development of the Advanced Encryption Standard
-
Prof. Dr Klaus Brunstein
Requirements for Safety and Security Policies in Networked Organisations
14th Conference, Vienna/Budapest, Austria/Hungary, 31 August - 04 September 1998
Co-located events
-
IFIP World Computer Congress (WCC 1998)
Proceedings
-
"Global IT security"
64 papers (including a special session of three papers on 'Developing Steps in Hungarian IT Security')
ISBN: ISBN: 3-85403-116-5
Editors
-
György Papp, Reinhard Posch
Keynote Speakers
-
Richard Sizer (KBA Award)
-
Joseph N. Pato
Securing the Extended Enterprise in an Electronic World
-
Tim Moses
Building the Global PKI
-
Mark Rotenberg
Privacy Protection and the Future of Electronic Commerce
13th Conference, Copenhagen, Denmark, 14-16 May 1997
Proceedings
-
"Information Security in Research and Business"
36 papers (plus one position paper)
ISBN: ISBN: 978-0-387-35259-6
Editors
-
Louise Yngström, Jan Carlsen
Invited Speakers
-
Alan Stanley
Information Security - Challenges for the Next Millenium
-
Prof. Mads Bryde Andersen
The Role of Government in Creating the IT Infrastructure: Builder or Bystander?
-
Håkan Jansson
A United Approach to the IT-Society. On Electronic Identify Cards and Infrastructures
-
Willis H Ware
Retrospectives and Emerging Insights on IT Security
12th Conference, Samos Island, Greece, 21-24 May 1996
Proceedings
-
"Information Systems Security: Facing the Information Society of the 21st Century"
35 papers (plus three invited papers)
ISBN: 978-1-5041-2919-0
Editors
-
Sokratis K. Katsikas, Dimitris Gritzalis
Statistics
-
Submissions: 102
Accepted: 35 (plus 9 posters)
Ratio: 34.3%
Invited Speakers
-
Dorothy Denning
New Directions in Infosecurity
-
H. Hosmer
New security paradigms: Orthodoxy and Herecy
-
S. von Solms
Information Security on the Electronic Superhighway
-
D. Herson
Experiences from the European Commission's INFOSEC Programme
-
S. Frangos
Software quality assurance: The underlying framework for achieving secure and reliable software systems
-
L. Yngstrom
University education on IT security and privacy
11th Conference, Cape Town, South Africa, 09-12 May 1995
Co-located events
-
WG11.1 Workshop on Information Security Management (WISM)
WG11.3 Workshop on Database Security
WG11.5 Workshop on System Integrity
WG11.8 Workshop on Information Security Education (WISE)
Proceedings
-
"Information Security - the Next Decade"
40 papers (plus five invited papers)
ISBN: 978-0-387-34873-5
Editors
-
Jan HP Eloff, Sebastiaan H. von Solms
Statistics
-
Submissions: 90
Reviews/paper: 3+
Accepted: 40
Ratio: 44.4%
Invited Speakers
-
Bill Murray
Security should pay: it should not cost
-
Donn Parker
A new framework for information security to avoid information anarchy
-
Sead Muftic
Functional and operational security system for open distributed environments
-
Lance Hoffman
Encryption policy for the Global Information Infrastructure
-
Kurt Bauknecht
The escalating role of informatin security management
-
Fred Cohen
Viruses, corruption, denial, disruption and information assurance
10th Conference, Curaçao, Dutch Carribbean, 23-27 May 1994
Proceedings
-
51 papers
The proceedings for the 1994 conference were scheduled to be published through North-Holland (later Elsevier) but never completed. We have a set of PDFs of all of the papers included in the 'delegate handout' and are adding them to this site on a dedicated page.
Invited Speakers
-
Dr N Balausbramanian
Computer Based Cryptanalysis: Man vs Machine Approach
-
Ken van Wyk
Estabishing a CERT: Computer Emergency Response Team
-
Wayne Madsen
Privacy Aspects of Data Travelling Along the New Highway
-
Ross Paul
Issues in Designing and implementing a Practical Enterprise Security Architecture
-
Winn Schwartau
Information Warfare: Waging and Winning Conflict in Cyberspace