RFIDSec: Radio Frequency Identification: Security and Privacy Issues

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
RFIDSec 2016 12th Workshop on RFID and IoT Security
Nov 30, 2016 - Dec 2, 2016 Hong Kong Sep 12, 2016
RFIDSec 2014 The 10th Workshop on RFID Security
Jul 21, 2014 - Jul 23, 2014 Oxford, United Kingdom Mar 1, 2014
RFIDsec 2013 RFIDsec 2013 - Workshop on RFID Security 2013
Jul 9, 2013 - Jul 11, 2013 Graz, Austria Apr 2, 2013
RFIDSec 2010 Radio Frequency Identification Security
Jun 8, 2010 - Jun 10, 2010 Istanbul, Turkey Apr 20, 2010
 
 

Present CFP : 2016

Started in 2005, RFIDsec has become the premier venue devoted to security and privacy of Radio Frequency Identification (RFID). The nature of radio-enabled item identification and automatic data capture has significantly changed over the years driven by the interest in overarching applications such as the Internet-of-Things and cyber-physical systems. As such, RFIDsec has also broadened its scope and seeks papers describing any contributions to security and privacy in any application area related to any constrained devices, such as sensor nodes, smart wearables, smart cards, programmable logic controllers (PLCs) and RFID tags.

Topics of interest include:
- System security aspects related to any emerging application area of constrained platforms, e.g. Internet-of-Things, cyber-physical systems, e-health devices, etc.
- Implementations of cryptography and protocols with constrained resources in terms of energy, power, computation resources and memory footprint
- Secure software and hardware architectures and software for embedded constrained devices and systems
- Side-channel, tamper and reverse-engineering resistant designs and countermeasures for constrained platforms
- Physical-layer security and contextual authentication/pairing for constrained devices
- User-centric security issues, e.g. continuous user authentication, user-centric data privacy management, user consent for pervasively sensed data, etc.
- Design issues related to reliability and scalability of security services in large systems, e.g. key management, device updates and security life cycle
 

Related Resources

IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
DLIS 2022   Deep Learning for IoT Security - Frontiers in Big Data Journal
IEEE COINS 2022   BCIOT - Special Track on Blockchain and Internet of Things (IoT)
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
IEEE COINS 2022   International Conference on Omni-Layer Intelligent Systems Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Se
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
IoTBDS 2022   7th International Conference on Internet of Things, Big Data and Security
IJSCAI 2022   International Journal on Soft Computing, Artificial Intelligence and Applications
IJANS 2022   International Journal on AdHoc Networking Systems
NISecurity 2022   2022 International Conference on Network and Information Security (NISecurity 2022)