RFIDSec: Radio Frequency Identification: Security and Privacy Issues

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
RFIDSec 2016 12th Workshop on RFID and IoT Security
Nov 30, 2016 - Dec 2, 2016 Hong Kong Sep 12, 2016
RFIDSec 2014 The 10th Workshop on RFID Security
Jul 21, 2014 - Jul 23, 2014 Oxford, United Kingdom Mar 1, 2014
RFIDsec 2013 RFIDsec 2013 - Workshop on RFID Security 2013
Jul 9, 2013 - Jul 11, 2013 Graz, Austria Apr 2, 2013
RFIDSec 2010 Radio Frequency Identification Security
Jun 8, 2010 - Jun 10, 2010 Istanbul, Turkey Apr 20, 2010
 
 

Present CFP : 2016

Started in 2005, RFIDsec has become the premier venue devoted to security and privacy of Radio Frequency Identification (RFID). The nature of radio-enabled item identification and automatic data capture has significantly changed over the years driven by the interest in overarching applications such as the Internet-of-Things and cyber-physical systems. As such, RFIDsec has also broadened its scope and seeks papers describing any contributions to security and privacy in any application area related to any constrained devices, such as sensor nodes, smart wearables, smart cards, programmable logic controllers (PLCs) and RFID tags.

Topics of interest include:
- System security aspects related to any emerging application area of constrained platforms, e.g. Internet-of-Things, cyber-physical systems, e-health devices, etc.
- Implementations of cryptography and protocols with constrained resources in terms of energy, power, computation resources and memory footprint
- Secure software and hardware architectures and software for embedded constrained devices and systems
- Side-channel, tamper and reverse-engineering resistant designs and countermeasures for constrained platforms
- Physical-layer security and contextual authentication/pairing for constrained devices
- User-centric security issues, e.g. continuous user authentication, user-centric data privacy management, user consent for pervasively sensed data, etc.
- Design issues related to reliability and scalability of security services in large systems, e.g. key management, device updates and security life cycle
 

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IoTBDS 2019   3rd International Conference on Internet of Things, Big Data and Security
DSN 2019   Dependable Systems and Networks
CRC-Botnets 2018   Botnets: Architectures, Countermeasures, and Challenges
IEEE 5G-Security 2019   The 2019 IEEE Workshop on 5G Wireless Security with IEEE ICC 2019
NECO 2018   7th International Conference of Networks and Communications
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
FGCS SI on Secruity 2018   Special Issue on Trusted Cloud-Edges (CE) Computations
JISA-IoT-A&D 2018   Recent Advances in Internet-of-Things Attacks and Defences
Symmetry-SI 2018   Symmetry and Asymmetry Applications for Internet of Things Security and Privacy