WISTP: Workshop in Information Security Theory and Practice



Past:   Proceedings on DBLP

Future:  Post a CFP for 2018 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
WISTP 2017 11th International Conference on Information Security Theory and Practice
Sep 28, 2017 - Sep 29, 2017 Heraklion, Crete Jun 15, 2017
WISTP 2016 10th WISTP International Conference on Information Security Theory and Practice
Sep 26, 2016 - Sep 27, 2016 Heraklion, Crete, Greece Jun 4, 2016
WISTP 2015 The 9th WISTP International Conference on Information Security Theory and Practice
Aug 24, 2015 - Aug 25, 2015 Crete, Greece Apr 24, 2015
WISTP 2014 8th Workshop in Information Security Theory and Practice (WISTP 2014)
Jun 30, 2014 - Jul 2, 2014 Heraklion, Greece Mar 14, 2014
WISTP 2013 Seventh Workshop in Information Security Theory and Practice
May 28, 2013 - May 30, 2013 Heraklion, Greece Jan 31, 2013
WISTP 2012 6th Workshop in Information Security Theory and Practice
Jun 19, 2012 - Jun 22, 2012 London, UK Jan 31, 2012
WISTP 2011 5th Workshop In Information Security Theory and Practice
Jun 1, 2011 - Jun 3, 2011 Heraklion, Crete, Greece Dec 15, 2010
WISTP 2010 Fourth Workshop in Information Security Theory and Practice (WISTP 2010) - Security and Privacy of Pervasive Systems and Smart Devices
Apr 13, 2010 - Apr 14, 2010 Passau, Germany Dec 4, 2009
WISTP 2009 Workshop in Information Security Theory and Practices 2009: Smart Devices, Pervasive Systems, and Ubiquitous Networks
Sep 2, 2009 - Sep 4, 2009 Brussels, Belgium May 3, 2009
WISTP 2008 Workshop in Information Security Theory and Practices 2008: Smart Devices, Convergence and Next Generation Networks
May 13, 2008 - May 16, 2008 Sevilla, Spain Jan 20, 2008

Present CFP : 2017

The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017) seeks original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues.

In 2007, Workshop in Information Security Theory and Practice (WISTP) was created as a forum for bringing together researchers and practitioners in related areas and to encourage interchange and cooperation between the research community and the industrial/consumer community. From 2015, due to increased participation it has become a Conference.

Submissions with regards to the security of future ICT technologies, such as cyber-physical systems, cloud services, data science and the Internet of Things are particularly welcome.

Other topics of interest include, but are not limited to:

* Security and Privacy in Smart Devices
- Biometrics, National ID cards
- Embedded Systems Security and TPMs
- Interplay of TPMs and Smart Cards
- Mobile Codes Security
- Mobile Devices Security
- Mobile Malware
- Mobile OSes Security Analysis
- New Applications for Secure RFID Systems
- RFID Systems
- Smart Card
- Smart Devices Applications
- Wireless Sensor Node

* Security and Privacy in Networks
- Ad Hoc Networks
- Delay-Tolerant Network
- Domestic Network
- Peer-to-Peer Networks
- Security Issues in Mobile and Ubiquitous Networks
- Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks
- Vehicular Network
- Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others

* Security and Privacy in Architectures, Protocols, Policies, Systems and Applications
- BYOD Contexts
- Cloud-enhanced Mobile Security
- Critical Infrastructure (e.g. for Medical or Military Applications)
- Cyber-Physical Systems
- Digital Rights Management (DRM)
- Distributed Systems and Grid Computing
- Information Assurance and Trust Management
- Intrusion Detection and Information Filtering
- Lightweight cryptography
- Localization Systems (Tracking of People and Goods)
- M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to
- Mobile Commerce
- Multimedia Applications
- Public Administration and Governmental Services
- Pervasive Systems
- Privacy Enhancing Technologies
- Secure self-organization and self-configuration
- Security Models, Architecture and Protocol: for Identification and Authentication, Access Control, Data Protection
- Security Policies (Human-Computer Interaction and Human Behavior Impact)
- Security Measurements
- Smart Cities
- Systems Controlling Industrial Processes

Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most 16 pages in total in the Springer LNCS format.

For detailed instructions please see the website.

Related Resources

ECML-PKDD 2017   European Conference on Machine Learning and Principles and Practice of Knowledge Discovery
SECURWARE 2017   The Eleventh International Conference on Emerging Security Information, Systems and Technologies
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
SoICT 2017   The Eighth International Symposium on Information and Communication Technology
ICISIP 2017   The 5th IIAE International Conference on Intelligent Systems and Image Processing 2017
ICISSP 2018   4th International Conference on Information Systems Security and Privacy
MobiSec 2017   Special Issue on Mobile Systems, Mobile Networks and Mobile Cloud: Security, Privacy and Digital Forensics
4th IEEE ICIIP 2017   International Conference on Image Information Processing (ICIIP 2017)
IJCSITY 2017   International Journal of Computational Science and Information Technology
ICIT - Ei 2017   2017 International Conference on Information Technology (ICIT 2017)--Ei Compendex, Scopus