RFIDSec: Radio Frequency Identification: Security and Privacy Issues

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
RFIDSec 2016 12th Workshop on RFID and IoT Security
Nov 30, 2016 - Dec 2, 2016 Hong Kong Sep 12, 2016
RFIDSec 2014 The 10th Workshop on RFID Security
Jul 21, 2014 - Jul 23, 2014 Oxford, United Kingdom Mar 1, 2014
RFIDsec 2013 RFIDsec 2013 - Workshop on RFID Security 2013
Jul 9, 2013 - Jul 11, 2013 Graz, Austria Apr 2, 2013
RFIDSec 2010 Radio Frequency Identification Security
Jun 8, 2010 - Jun 10, 2010 Istanbul, Turkey Apr 20, 2010
 
 

Present CFP : 2016

Started in 2005, RFIDsec has become the premier venue devoted to security and privacy of Radio Frequency Identification (RFID). The nature of radio-enabled item identification and automatic data capture has significantly changed over the years driven by the interest in overarching applications such as the Internet-of-Things and cyber-physical systems. As such, RFIDsec has also broadened its scope and seeks papers describing any contributions to security and privacy in any application area related to any constrained devices, such as sensor nodes, smart wearables, smart cards, programmable logic controllers (PLCs) and RFID tags.

Topics of interest include:
- System security aspects related to any emerging application area of constrained platforms, e.g. Internet-of-Things, cyber-physical systems, e-health devices, etc.
- Implementations of cryptography and protocols with constrained resources in terms of energy, power, computation resources and memory footprint
- Secure software and hardware architectures and software for embedded constrained devices and systems
- Side-channel, tamper and reverse-engineering resistant designs and countermeasures for constrained platforms
- Physical-layer security and contextual authentication/pairing for constrained devices
- User-centric security issues, e.g. continuous user authentication, user-centric data privacy management, user consent for pervasively sensed data, etc.
- Design issues related to reliability and scalability of security services in large systems, e.g. key management, device updates and security life cycle
 

Related Resources

blockchain_ml_iot 2023   Network (MDPI) Special Issue - Blockchain and Machine Learning for IoT: Security and Privacy Challenges
IOTBC 2023   International Conference IOT, Blockchain and Cryptography
EAI ICECI 2023   4th International Conference on Edge Computing and IoT: Systems, Management and Security
NeTCoM 2023   15th International Conference on Networks & Communications
IEEE TCS SpliTech 2023   SpliTech 2023 - 8th International Conference on Smart and Sustainable Technologies
CIOS 2023   International Conference on Cloud, IoT and Security
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
IET-CPS-SI:IoT-based Secure Health 2023   Special issue on IoT-based Secure Health Monitoring and Tracking through Estimated Computing
PCEIoT 2023   3rd Workshop on Privacy in the Cloud/Edge/IoT World 2023
CBIoT 2023   4th International Conference on Cloud, Big Data and IoT