WISTP: Workshop in Information Security Theory and Practice

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2019 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
WISTP 2018 12th International Conference on Information Security Theory and Practice - Deadline is extended to October 14, 2018 - FIRM DEADLINE
Dec 10, 2018 - Dec 11, 2018 Brussels, Belgium Oct 14, 2018
WISTP 2017 11th International Conference on Information Security Theory and Practice
Sep 28, 2017 - Sep 29, 2017 Heraklion, Crete Jun 29, 2017
WISTP 2016 10th WISTP International Conference on Information Security Theory and Practice
Sep 26, 2016 - Sep 27, 2016 Heraklion, Crete, Greece Jun 4, 2016
WISTP 2015 The 9th WISTP International Conference on Information Security Theory and Practice
Aug 24, 2015 - Aug 25, 2015 Crete, Greece Apr 24, 2015
WISTP 2014 8th Workshop in Information Security Theory and Practice (WISTP 2014)
Jun 30, 2014 - Jul 2, 2014 Heraklion, Greece Mar 14, 2014
WISTP 2013 Seventh Workshop in Information Security Theory and Practice
May 28, 2013 - May 30, 2013 Heraklion, Greece Jan 31, 2013
WISTP 2012 6th Workshop in Information Security Theory and Practice
Jun 19, 2012 - Jun 22, 2012 London, UK Jan 31, 2012
WISTP 2011 5th Workshop In Information Security Theory and Practice
Jun 1, 2011 - Jun 3, 2011 Heraklion, Crete, Greece Dec 15, 2010
WISTP 2010 Fourth Workshop in Information Security Theory and Practice (WISTP 2010) - Security and Privacy of Pervasive Systems and Smart Devices
Apr 13, 2010 - Apr 14, 2010 Passau, Germany Dec 4, 2009
WISTP 2009 Workshop in Information Security Theory and Practices 2009: Smart Devices, Pervasive Systems, and Ubiquitous Networks
Sep 2, 2009 - Sep 4, 2009 Brussels, Belgium May 3, 2009
WISTP 2008 Workshop in Information Security Theory and Practices 2008: Smart Devices, Convergence and Next Generation Networks
May 13, 2008 - May 16, 2008 Sevilla, Spain Jan 20, 2008
 
 

Present CFP : 2018

Please accept our apologies if you receive multiple copies of this CFP
[online version]

******************************************************
Due to several requests, the deadline is extended to October 14, 2018 - FIRM DEADLINE
(11:59 p.m. American Samoa time)
******************************************************
.:: Call for Papers ::.
=======================
12th WISTP International Conference on Information Security Theory and Practice (WISTP 2018)
Brussels, Belgium -- 10-11 December 2018

http://www.wistp.org/

Deadline for submissions: 14 October 2018 - FIRM DEADLINE

Future ICT technologies, such as the concepts of Ambient Intelligence, Cyber-physical Systems, and Internet of Things provide a vision of the Information Society in which: a) people and physical systems are surrounded with intelligent interactive interfaces and objects, and b) environments are capable of recognising and reacting to the presence of different individuals or events in a seamless, unobtrusive, and invisible manner. The success of future ICT technologies will depend on how secure these systems are and to what extent they protect the privacy of individuals and individuals trust them.

The 12th WISTP International Conference on Information Security Theory and Practice (WISTP'2018) seeks original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business, and policy that present these communities' perspectives

Topics of Interest:
Security and Privacy in Smart Devices
Biometrics, National ID cards
Embedded Systems Security and TPMs
Interplay of TPMs and Smart Cards
Mobile Codes Security
Mobile Devices Security
Mobile Malware
Mobile OSes Security Analysis
RFID Systems
Smart Card
Smart Devices Applications
Wireless Sensor Node


Security and Privacy in Networks
Ad Hoc Networks
Content Defined Networks
Delay-Tolerant Networks
Domestic Networks
GSM/GPRS/UMTS Systems
Peer-to-Peer Networks
Security Issues in Mobile and Ubiquitous Networks
Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks
Vehicular Networks
Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others


Security and Privacy in Architectures, Protocols, Policies, Systems and Applications
BYOD Contexts
Big Data Management
Cloud Systems
Critical Infrastructure (e.g. for Medical or Military Applications)
Crowdsourcing
Cyber-Physical Systems
Data and Computation Integrity
Digital Rights Management (DRM)
Distributed Systems
Grid Computing
Identity and Trust Management
Information Assurance
Information Filtering
Internet of Things
Intrusion Detection
Lightweight cryptography
Localization Systems (Tracking of People and Goods)
M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human)
Mobile Commerce
Multimedia Applications
Public Administration and Governmental Services
Privacy Enhancing Technologies
Secure self-organization and self-configuration
Security Models, Architecture and Protocol: for Identification and Authentication, Access Control, Data Protection
Security Policies (Human-Computer Interaction and Human Behavior Impact)
Security Measurements
Smart Cities
Social Networks
Systems Controlling Industrial Processes


IMPORTANT DATES

Deadline for paper submission: October 14th, 2018 (11:59 p.m. AOE) - FIRM DEADLINE
Notification to authors: November 5th, 2018
Author Registration: November 15th, 2018
Camera-ready version: December 2nd, 2018


Submission Instructions
Submissions must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most 16 pages in total in the Springer’s LNCS format. All submissions should be anonymous (i.e., no author names/affiliations and obvious citations).
Submissions are to be made to the submission web site: https://easychair.org/conferences/?conf=wistp2018

Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series, and the proceedings will be available at the conference. The camera-ready version of the accepted papers must follow Springer guidelines (a Latex source file will be required).

If a submitted paper is mainly the work of a student author, this paper is eligible for the best student paper award. To participate in this selection process, please add the word "STUDENT" in the affiliation field in the submission form.

Authors of accepted papers must guarantee that their papers will be presented at the conference. At least one author of each accepted paper is required to register with the conference and present the paper. For authors presenting multiple papers, one normal registration is valid for up to two papers.

Scientific supports
- IFIP WG 11.2 Pervasive Systems Security

Journal Information Sponsorship
- Information (an Open Access Journal by MDPI) will offer to main authors of Best Paper and Best Student Paper to waive the fee for a future publication in the journal.

Main author of accepted papers will receive a 200€ voucher for a future publication in the journal.

Note this offer is not related to an extended version of the presented papers. It can be any article from the main author. This submission will go through the whole reviewing process of the journal which is completely independent to WISTP.
--
Damien Sauveron
http://damien.sauveron.fr/
 

Related Resources

SPT-SN-IoT 2019   Special Issue Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
DSN 2019   Dependable Systems and Networks
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
IEEE S&P 2019   IEEE Symposium on Security and Privacy
ACNS 2019   International Conference on Applied Cryptography and Network Security
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11
MDPI Information 2019   MDPI OA Journal of Information Science, Technology and Engineering --SI on Machine Learning for Cyber-Security
DBSEC 2019   33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
IJIBM 2019   Call For Papers - International Journal of Information, Business and Management