RFIDSec: Radio Frequency Identification: Security and Privacy Issues

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
RFIDSec 2016 12th Workshop on RFID and IoT Security
Nov 30, 2016 - Dec 2, 2016 Hong Kong Sep 12, 2016
RFIDSec 2014 The 10th Workshop on RFID Security
Jul 21, 2014 - Jul 23, 2014 Oxford, United Kingdom Mar 1, 2014
RFIDsec 2013 RFIDsec 2013 - Workshop on RFID Security 2013
Jul 9, 2013 - Jul 11, 2013 Graz, Austria Apr 2, 2013
RFIDSec 2010 Radio Frequency Identification Security
Jun 8, 2010 - Jun 10, 2010 Istanbul, Turkey Apr 20, 2010
 
 

Present CFP : 2016

Started in 2005, RFIDsec has become the premier venue devoted to security and privacy of Radio Frequency Identification (RFID). The nature of radio-enabled item identification and automatic data capture has significantly changed over the years driven by the interest in overarching applications such as the Internet-of-Things and cyber-physical systems. As such, RFIDsec has also broadened its scope and seeks papers describing any contributions to security and privacy in any application area related to any constrained devices, such as sensor nodes, smart wearables, smart cards, programmable logic controllers (PLCs) and RFID tags.

Topics of interest include:
- System security aspects related to any emerging application area of constrained platforms, e.g. Internet-of-Things, cyber-physical systems, e-health devices, etc.
- Implementations of cryptography and protocols with constrained resources in terms of energy, power, computation resources and memory footprint
- Secure software and hardware architectures and software for embedded constrained devices and systems
- Side-channel, tamper and reverse-engineering resistant designs and countermeasures for constrained platforms
- Physical-layer security and contextual authentication/pairing for constrained devices
- User-centric security issues, e.g. continuous user authentication, user-centric data privacy management, user consent for pervasively sensed data, etc.
- Design issues related to reliability and scalability of security services in large systems, e.g. key management, device updates and security life cycle
 

Related Resources

Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IoTBDS 2018   3rd International Conference on Internet of Things, Big Data and Security
IoT-CyberTrust 2018   IEEE Computer Special Issue on Cybertrust in the IoT Age
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
IoT @ ACM SAC 2018   ACM SAC 2018 Special Track on Internet of Things (IoT)
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
IPSN 2018   ACM/IEEE Information Processing in Sensor Networks
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications