posted by user: DSPSR || 5567 views || tracked by 5 users: [display]

IEEE ISSNIP RFID 2013 : IEEE ISSNIP 2013 Workshop on RFID Technology, Applications and Security

FacebookTwitterLinkedInGoogle

Link: http://www.issnip.org/2013/wk-RFID-tech-app-sec.html
 
When Apr 2, 2013 - Apr 5, 2013
Where Melbourne, Australia
Abstract Registration Due Dec 5, 2012
Submission Deadline Dec 7, 2012
Notification Due Dec 20, 2012
Final Version Due Jan 10, 2013
Categories    RFID   security
 

Call For Papers

***IEEE ISSNIP 2013 Workshop on RFID Technology, Applications and Security***
In conjunction with the 8th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), April 2-5, 2013, Melbourne, Australia
(http://www.issnip.org/2013/wk-RFID-tech-app-sec.html)

***Extended Deadlines***
Abstract Submission Deadline: December 5, 2012
Paper Submission Deadline: December 7, 2012

Radio Frequency Identification (RFID) technology enables the non-contact, automatic and unique identification of objects and people using radio waves. As the need for auto identification (auto-ID) systems becomes increasingly common place in many economic sectors, potential RFID applications include homeland security (RFID enabled passports), e-business (RFID enabled credit cards), e-cash (RFID enabled bank notes) and automated supply chain management. It is estimated that the RFID market will be worth around US$26.9 billion worldwide by 2015. However, there are significant research challenges that still need to be addressed before the widespread adoption of RFID systems.
The main purpose of this workshop is to serve as a forum that brings together RFID researchers and practitioners from academia, industry and government to discuss recent developments in RFID systems and technology, applications and security. This platform will also serve to identify key research challenges in the design, operation, analysis, practical application and optimization of RFID systems.
Topics of interest include, but are not limited to:
• RFID antenna theory and design, channel measurements and modelling
• RFID software and middleware
• Coding, anti-collision, and medium access schemes
• RFID Localisation techniques and algorithms in RFID tag and reader localization
• RFID Integration with Sensors
• RFID sensor modelling and analysis
• Privacy preserving techniques
• Vulnerability and Cryptanalysis
• Lightweight Cryptography for sensors and RFID
• Security Standards, Frameworks and Protocols
• Security in mobile sensor and RFID systems
• Trust management and related frameworks
• Security policy and management
• Key management techniques
• Specific application contexts with a scientific focus (e.g., healthcare, military, supply chains)

Submission Guidelines: Prospective authors are invited to submit full papers (up to 6 pages in length, A4 page only) electronically through the EDAS system (http://edas.info/13215). Papers must be original material not currently under review by another conference or journal. All submitted papers will be subjected to multiple independent peer reviews. Submission implies the willingness of at least one of the authors to register and present the paper. All accepted papers will be published by the IEEE Press and will appear in the Conference Proceedings and on IEEE Xplore.

IMPORTANT DATES
Abstract Submission Deadline: December 5, 2012
Paper Submission Deadline: December 7, 2012
Paper Acceptance Notification: December 20, 2012
Camera Ready Manuscript: January 10, 2013

WORKSHOP CHAIRS
Robin Doss, Deakin University, Australia (robin.doss@deakin.edu.au)
Selwyn Piramuthu, University of Florida (selwyn.piramuthu@warrington.ufl.edu)

Technical Programme Committee
Gildas Avoine, Université catholique de Louvain (UCL), Belgium
Lejla Batina, Radboud University Nijmegen, The Netherlands
Roberto DiPietro, Università di Roma Tre, Italy
John Gan, National RFID Centre, Singapore
Gul N. Khan, Ryerson University, Canada
Albert Levi, Sabanci University, Turkey
Pedro Peris-Lopez, Universidad Carlos III de Madrid, Spain
Chris Mitchell, Royal Holloway, University of London, UK
Xianming Qing, Institute for Infocomm Research, Singapore
David Sundaram, University of Auckland, New Zealand
Wei Zhou, ESCP Europe, France

Related Resources

IEEE CiSt 2020   6th IEEE Congress on Information Science and Technology
SP 2020   IEEE Symposium on Security and Privacy
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
IEEE AIML4COINS 2020   IEEE AIML4COINS2020 | Artificial Intelligence | Machine Learning | Deep Learning | Machine Vision | Big Data Analytics | Video Analytics | Speech Recognition | NLP
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
MNLP 2020   4th IEEE Conference on Machine Learning and Natural Language Processing
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
IEEE--ICICN--Ei Compendex, Scopus 2020   IEEE--2020 The 8th International Conference on Information, Communication and Networks (ICICN 2020)--Ei Compendex, Scopus
IEEE ICSGSC--EI, Scopus 2020   2020 The 4th. IEEE International Conference on Smart Grid and Smart Cities (ICSGSC 2020)--EI Compendex, Scopus
ICCSEA 2019   9th International Conference on Computer Science, Engineering and Applications