WISTP: Workshop in Information Security Theory and Practice



Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
WISTP 2016 10th WISTP International Conference on Information Security Theory and Practice
Sep 26, 2016 - Sep 27, 2016 Heraklion, Crete, Greece Jun 4, 2016
WISTP 2015 The 9th WISTP International Conference on Information Security Theory and Practice
Aug 24, 2015 - Aug 25, 2015 Crete, Greece Apr 24, 2015
WISTP 2014 8th Workshop in Information Security Theory and Practice (WISTP 2014)
Jun 30, 2014 - Jul 2, 2014 Heraklion, Greece Mar 14, 2014
WISTP 2013 Seventh Workshop in Information Security Theory and Practice
May 28, 2013 - May 30, 2013 Heraklion, Greece Jan 31, 2013
WISTP 2012 6th Workshop in Information Security Theory and Practice
Jun 19, 2012 - Jun 22, 2012 London, UK Jan 31, 2012
WISTP 2011 5th Workshop In Information Security Theory and Practice
Jun 1, 2011 - Jun 3, 2011 Heraklion, Crete, Greece Dec 15, 2010
WISTP 2010 Fourth Workshop in Information Security Theory and Practice (WISTP 2010) - Security and Privacy of Pervasive Systems and Smart Devices
Apr 13, 2010 - Apr 14, 2010 Passau, Germany Dec 4, 2009
WISTP 2009 Workshop in Information Security Theory and Practices 2009: Smart Devices, Pervasive Systems, and Ubiquitous Networks
Sep 2, 2009 - Sep 4, 2009 Brussels, Belgium May 3, 2009
WISTP 2008 Workshop in Information Security Theory and Practices 2008: Smart Devices, Convergence and Next Generation Networks
May 13, 2008 - May 16, 2008 Sevilla, Spain Jan 20, 2008

Present CFP : 2016


10th WISTP International Conference on Information Security Theory
and Practice (WISTP 2016)
Heraklion, Crete, Greece -- 26-27 September 2016

The 10th WISTP International Conference on Information Security Theory
and Practice (WISTP 2016) seeks original submissions from academia and
industry presenting novel research on all theoretical and practical
aspects of security and privacy, as well as experimental studies of
fielded systems, the application of security technology, the
implementation of systems, and lessons learned.
We encourage submissions from other communities such as law,
business, and policy that present these communities' perspectives on
technological issues.

Topics of interest include, but are not limited to:

* Security and Privacy in Smart Devices
-- Biometrics, National ID cards
-- Embedded Systems Security and TPMs
-- Interplay of TPMs and Smart Cards
-- Mobile Codes Security
-- Mobile Devices Security
-- Mobile Malware
-- Mobile OSes Security Analysis
-- RFID Systems
-- Smart Card
-- Smart Devices Applications
-- Wireless Sensor Node

* Security and Privacy in Networks
-- Ad Hoc Networks
-- Content Defined Networks
-- Delay-Tolerant Networks
-- Domestic Networks
-- GSM/GPRS/UMTS Systems
-- Mobile Networks
-- Peer-to-Peer Networks
-- Pervasive and Ubiquitous Systems
-- Sensor Networks:
Campus Area, Body Area, Sensor and Metropolitan Area Networks
-- Vehicular Networks
-- Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others

* Security and Privacy in Architectures, Protocols, Policies,
Systems and Applications
-- BYOD Contexts
-- Big Data Management
-- Cloud Systems
-- Critical Infrastructure (e.g. for Medical or Military Applications)
-- Crowdsourcing
-- Cyber-Physical Systems
-- Data and Computation Integrity
-- Digital Rights Management (DRM)
-- Distributed Systems
-- Grid Computing
-- Identity and Trust Management
-- Information Assurance
-- Information Filtering
-- Internet of Things
-- Intrusion Detection
-- Lightweight cryptography
-- Location Services (Tracking of People and Goods)
-- M2M (Machine to Machine), H2M (Human to Machine) and
M2H (Machine to Human)
-- Mobile Commerce
-- Multimedia Applications
-- Public Administration and Governmental Services
-- Privacy Enhancing Technologies
-- Secure self-organization and self-configuration
-- Security Models, Architecture, and Protocol
for Identification and Authentication, Access Control,
Data Protection
-- Security Policies
(Human-Computer Interaction and Human Behavior Impact)
-- Security Measurements
-- Smart Cities
-- Social Networks
-- Systems Controlling Industrial Processes

Submissions must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or
conference/workshop with proceedings. Each submission should be
at most 16 pages in total in the Springer's LNCS format.
All submissions should be anonymous (i.e., no author
names/affiliations and obvious citations).
Submissions are to be made to the submission web site:

Only PDF files will be accepted. Submissions not meeting these
guidelines risk rejection without consideration of their merits.
Accepted papers will be published by Springer in the Lecture Notes
in Computer Science series, and the proceedings will be available
at the conference. The camera-ready version of the accepted papers
must follow Springer guidelines (a Latex source file will be

If a submitted paper is mainly the work of a student author, this
paper is eligible for the best student paper award. To participate
in this selection process, please add the word "STUDENT" in the
affiliation field in the submission form.

Authors of accepted papers must guarantee that their papers will be
presented at the conference. At least one author of each accepted paper
is required to register with the conference and present the paper.
For authors presenting multiple papers, one normal registration is
valid for up to two papers.

Deadline for paper submission: 4 June 2016 (11:59 p.m. American Samoa time)
Notification to authors: 4 July 2016
Camera-ready version: 14 July 2016

Ioannis Askoxylakis, FORTH-ICS, Greece

Sara Foresti, Universita' degli Studi di Milano, Italy
Javier Lopez, University of Malaga, Spain

Damien Sauveron, University of Limoges, France

Ruggero Donida Labati, Universita' degli Studi di Milano, Italy

Ioannis Askoxylakis, FORTH-ICS, Greece
Lejla Batina, Radboud University Nijmegen, The Netherlands
Raymond Choo, University of South Australia, Australia
Jorge Cuellar, Siemens AG, Germany
Sabrina De Capitani di Vimercati, Univ. degli Studi di Milano, Italy
Jose Fernandez, Ecole Polytechnique de Montreal, Canada
Flavio Garcia, University of Birmingham
Dieter Gollmann, Hamburg University of Technology, Germany
Stefanos Gritzalis, University of the Aegean, Greece
Dimitris Gritzalis, AUEB, Greece
Brahim Hamid, IRIT Research Laboratory, France
Xinyi Huang, Fujian Normal University, China
Michael Hutter, Graz University of Technology, Austria
Sushil Jajodia, George Mason University, USA
Vasilis Katos, Bournemouth University, UK
Sokratis Katsikas, NTNU, Norway
Florian Kerschbaum, SAP, Germany
Maryline Laurent, Institut Mines-Telecom, France
Giovanni Livraga, Università degli Studi di Milano, Italy
Evangelos Markatos, ICS/FORTH, Greece
Fabio Martinelli, CNR, Italy
Vashek Matyas, Masaryk University, Czech Republic
Sjouke Mauw, University of Luxembourg, Luxembourg
Alessio Merlo, University of Genoa, Italy
Haris Mouratidis, University of Brighton, UK
David Naccache, Ecole normale suprieure, France
Rolf Oppliger, eSECURITY Technologies, Switzerland
Stefano Paraboschi, Università degli Studi di Bergamo, Italy
Gerardo Pelosi, Politecnico di Milano, Italy
Pedro Peris-Lopez, Carlos III University, Spain
Guenther Pernul, Universität Regensburg, Germany
Milan Petkovic, Eindhoven University of Technology, The Netherlands
Frank Piessens, Katholieke Universiteit Leuven, Belgium
Joachim Posegga, University of Passau, Germany
Jean-Jacques Quisquater, UCL, Belgium
Silvio Ranise, FBK, Italy
Kui Ren, State University of New York at Buffalo, USA
Rodrigo Roman, University of Malaga, Spain
Pierangela Samarati, Università degli Studi di Milano, Italy
Dave Singelée, Katholieke Universiteit Leuven, Belgium
Miguel Soriano, Universitat Politècnica de Catalunya, Spain
Willy Susilo, University of Wollongong, Australia
Guilin Wang, Huawei Technologies, Singapore
Meng Yu, University of Texas at San Antonio, USA

Raja Naeem Akram, Royal Holloway University of London, UK
Angelos Bilas, FORTH-ICS & University of Crete, Greece
Sushil Jajodia, George Mason University, USA
Konstantinos Markantonakis, Royal Holloway Univ. of London, UK
Joachim Posegga, University of Passau, Germany
Jean-Jacques Quisquater, Catholic University of Louvain, Belgium
Damien Sauveron, University of Limoges, France

IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at

This call for papers and additional information about the conference
can be found at http://www.wistp.org/

Related Resources

CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
ECML-PKDD 2017   European Conference on Machine Learning and Principles and Practice of Knowledge Discovery
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
EuropeanSeC 2017   2017 European Security Conference
DNC2 2017   DiscourseNet Congress #2 - Interdisciplinary Discourse Studies: Theory and Practice
TPDL 2017   21st International Conference on Theory and Practice of Digital Libraries
Games-SI:DMNSP 2017   Games Special Issue on Decision Making for Network Security and Privacy.
COLT 2017   Computational Learning Theory
ICONIP 2017   International Conference on Neural Information Processing
PPoPP 2017   22nd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming