posted by user: pengzhangyz || 7352 views || tracked by 16 users: [display]

TrustID 2012 : The 2nd IEEE International Symposium on Trust and Identity in Mobile Internet, Computing and Communications


When Jun 25, 2012 - Jun 27, 2012
Where Liverpool, UK
Submission Deadline Apr 8, 2012
Notification Due Apr 20, 2012
Final Version Due May 8, 2012
Categories    trust   identity   security   privacy

Call For Papers

The 2nd IEEE International Symposium on Trust and Identity in Mobile Internet, Computing and Communications
(TrustID 2012
In conjunction with
The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12)
June 25-27, 2012, Liverpool, UK

Call for Papers
Trust and identity have become important factors that influence the success of our mobile life. Current research in trust and identity still faces a number of challenges, e.g. trustworthiness of trust/identity management systems, usability and robustness of trust/identity management, trust and identity management with privacy enhancement, adaptability and scalability issues, efficient power consumption support, etc. Due to dynamically changed computing environments, mobility, limited computing capability, restricted user interface for human-device interaction, instant communication characteristics and user privacy requirements, these challenges are more difficult to overcome in the context of mobile internet, computing and communications. Following the success of TrustID 2011, TrustID 2012 aims at providing a forum for continuously discussing the latest academic and industrial research results related to trust and identity in the area of mobile internet, computing and communications. Topics of interest include, but are not limited to:

 Perspective of trust and identity and their development
 Architecture, theories and technologies of trust/identity management
 Trust modeling methodologies
 Mobile computing trust technologies, trust evaluation, reputation/recommender systems
 Technologies and theories of identity management
 Digital identity management for trust and privacy enhancement
 Systems, applications and standardizations about trust and identity
 Applications and case studies of trust and identity systems
 Challenges and issues for practical deployment of trust and identity management systems
 Social and psychological issues of trust and identity
 Business issues related to trust and identity
 Human-computer interaction for trust and identity
 Usable trust and identity studies

Important Dates
Paper submission deadline: 08 April, 2012
Author notification: 20 April, 2012
Final manuscript due: 08 May, 2012
Registration due: 08 May, 2012
Workshop date: 25 June, 2012

Submission Instructions
Prospective authors are invited to submit manuscripts reporting original unpublished research and recent developments in the topics related to the workshop. The length of the papers should not exceed 6 pages + 2 pages for over length charges (IEEE Computer Society Proceedings Manuscripts style: two columns, single-spaced, 10-point font), including figures and references. You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page: URL:

Submissions should be sent by email to ( with the subject "TrustID2012 PAPER SUBMISSION".

Once accepted, the paper will be included into the IEEE conference proceedings published by IEEE Computer Society Press (indexed by EI). At least one of the authors of any accepted paper is requested to register the paper. Distinguished papers, after further revisions, will be invited for possible publication in special issues of prestige international journals indexed by SCI and EI (pending).

Program Co-Chairs
Zheng Yan
Aalto University, Finland/XiDian University, China
Raimo Kantola
Aalto University, Finland
Peng Zhang
Xi’an University of Post and Telecommunications, China

PC Members (In alphabetical order)
Pierre Abi-Char, American University of Technology, Lebanon
Yu Chen, EPFL, Switzerland
Alvin Chin, Nokia Research Center, China
Valtteri Niemi, Nokia Research Center, Finland
Ioanna Dionysiou, University of Nicosia, Cyprus
Yan Dong, Renmin University of China, China
Weili Han, Fudan University, China
Silke Holtmanns, Nokia Research Center, Finland
Yu Hua, Huazhong University of Science and Technology, China
Gabriele Lenzini, University of Luxembourg, Luxembourg
Abdallah Mahamed, Institut TELECOM, France
Yuexin Peng, Beijing University of Post and Telecommunications, China
Marinella Petrocchi, Istituto di Informatica e Telematica, CNR, Italy
Lei Shu, Osaka University, Japan
Qinghua Wang, Aalto University, Finland
Junze Wang, Huazhong University of Science and Technology, China
Yan Wang, Macquarie University, Australia
Andrew G. West, University of Pennsylvania, USA
Dajiang Zhang, Nokia, China
Yan Zhang, Simula Research Laboratory, Norway


Please email inquiries concerning TrustID 2012 to:
Prof. Peng Zhang (

Related Resources

Passive IoT 2023   Passive Internet of Things: challenges, solutions, and future trends
CEVVE 2023   2023 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2023)
IEEE ICBDA 2024   IEEE--2024 the 9th International Conference on Big Data Analytics (ICBDA 2024)
CSW 2023   2023 International Workshop on Cyber Security (CSW 2023)
ICSC 2024   IEEE International Conference on Semantic Computing
IEEE ICISPP 2023   IEEE--2023 4th International Conference on Information Security and Privacy Protection (ICISPP 2023)
ITCFEC 2023   Special Issue for Submission: Internet of Things and Cloud-Fog-Edge Computing
DPPR 2023   13th International Conference on Digital Image Processing and Pattern Recognition
IRC 2023   IEEE International Conference on Robotic Computing
CDKE 2024   IEEE International Conference on Conversational Data and Knowledge Engineering