posted by user: ikro || 12267 views || tracked by 22 users: [display]

PRISMS 2013 : International Conference on Privacy and Security in Mobile Systems


When Jun 24, 2013 - Jun 27, 2013
Where Atlantic City, NJ, USA
Submission Deadline Apr 29, 2013
Notification Due May 26, 2013
Final Version Due Jun 6, 2013
Categories    privacy   security   mobile   sensing

Call For Papers

PRISMS 2013 - International Conference on Privacy and Security in Mobile Systems

Atlantic City, NJ, USA
24 - 27 June 2013

* Technical co-Sponsorship by IEEE.
* Proceedings will be published in IEEE Xplore.
* PRISMS is part of the Global Wireless Summit 2013 (GWS-2013).

PRISMS is the successor of MobiSec (International Conference on Security and Privacy in Mobile Information and Communication Systems). The conference under a new name (PRISMS) is organized this year with the co-sponsorship of IEEE. Its focus is the convergence of information and communication technology in mobile scenarios. This convergence is realised in intelligent mobile devices, accompanied by the advent of next-generation communication networks. Privacy and security aspects need to be covered at all layers of mobile networks, from mobile devices, to privacy respecting credentials and mobile identity management, up to machine-to-machine communications.

In particular, mobile devices such as Smartphones and Internet Tablets have been very successful in commercialization. However, their security mechanisms are not always able to deal with the growing trend of information-stealing attacks. As mobile communication and information processing becomes a commodity, economy and society require protection of this precious resource. Mobility and trust in networking go hand in hand for future generations of users, who need privacy and security at all layers of technology. In addition, the introduction of new data collection practices and data-flows (e.g. sensing data) from the mobile device makes it more difficult to understand the new security and privacy threats introduced.

PRISMS strives to bring together the leading-edge of academia and industry in mobile systems security, as well as practitioners, standards developers and policymakers. Contributions may range from architecture designs and implementations to cryptographic solutions for mobile and resource-constrained devices.


Topics of interest include, but are not limited to, the following focus areas:

User Device Security and Privacy:

* Advanced Security & Privacy Mechanisms
* Trusted Execution Environments (TEE) and their applications
* Rogue Mobile Application Detection and Protection
* Secure Elements and Tokens
* Forensic Analysis

Machine-to-Machine Security:

* Device Identities and Authentication
* M2M Security Architectures and Standardization
* Remote Security Management, Verification, and Remediation of M2M Devices
* Societal Impact of M2M Communication Security Issues

Privacy and Security in Emerging Mobile Applications and Services:

* Privacy-respecting Authentication
* Mobile Identity Management
* Privacy in the Internet of Things
* Mobile Wallets, Mobile Payments
* Location-based Services and Mobile Sensing

Proposals for panels/demos/workshops/tutorials are solicited.
Potential organisers are welcome to submit a proposal to one of the general chairs or the Workshops or Panels chair.

Important Dates

Submission Date : April 29, 2013
Notification of acceptance: May 26, 2013
Camera Ready submission : June 6, 2013
Conference dates : June 24-27, 2013


Accepted papers will be published via the IEEE Xplore digital library. Best Paper Awards and Best Student Paper Awards (the first author should be a full-time student) will be granted. Selected high-quality papers will be invited to a Special Issue in the Journal of "Security and Communication Networks" (SCN, Wiley; to be confirmed).


Authors are invited to submit original papers of up to 8 pages for full papers and 4 pages for short papers including figures, tables, and references, in PDF format. It is strongly recommended to use the standard IEEE template for preparing your manuscript. Submission implies that at least one of the authors will register and present the paper at the conference. Electronic submission is accepted through EasyChair, using the link:

Organising Committee

General Co-Chairs:
* Neeli R. Prasad, Aalborg University, Denmark
* Andreas U. Schmidt, Novalyst IT AG, Karben, Germany

TPC Chair/TPC Co-Chairs:
* Ioannis Krontiris, Goethe University Frankfurt, Germany
* Giovanni Russello, University of Auckland, New Zealand

- Local Chair: Rasmus Hjorth Nielsen, CTIF, Princeton, USA
- Publication Chair: Shiguo Lian, France Telecom R&D, Beijing, China
- Publicity Chair: Changyu Dong, University of Strathclyde, UK

Program Committee
* Andreas Albers, Johann Wolfgang Goethe University Frankfurt, Germany
* Claudio Agostino Ardagna, Universita' degli Studi di Milano, Italy
* Lejla Batina, Katholieke Universiteit Leuven, COSIC, Belgium
* Zinaida Benenson, University of Erlangen-Nuremberg, Germany
* Marco Casassa Mont, Hewlett-Packard Labs, UK
* Mauro Conti, University of Padua, Italy
* Jorge Cuellar, Siemens AG, CT T, Munich, Germany
* Emiliano De Cristofaro, PARC, USA
* Tassos Dimitriou, Research Academic Computer Technology Institute (RACTI), Greece & Kuwait University, Kuwait
* Changyu Dong, University of Strathclyde, UK
* Naranker Dulay, Imperial College London, UK
* William Enck, North Carolina State University, USA
* David Eyers, University of Otago, New Zealand
* Hannes Federrath, University of Hamburg, Germany
* Felix Freiling, University of Erlangen, Germany
* Raghu Ganti, IBM T J Watson Research Center, USA
* Ashish Gehani, SRI International, USA
* Seda Gürses, K. U. Leuven, Belgium
* Dogan Kesdogan, University of Siegen, Germany
* Geir M. Køien, University of Agder, Norway
* Jiqiang Lu, Institute for Infocomm Research, Singapore
* Flaminia Luccio, Universita' Ca' Foscari Venezia, Italy
* Emmanouil Magkos, Department of Informatics, Ionian University, Greece
* Rene Mayrhofer, Upper Austria University of Applied Sciences, Austria
* Anand Prasad, NEC Corp., Japan
* Ian Molloy, IBM T J Watson Research Center, USA
* Kai Rannenberg, Goethe University Frankfurt, Germany
* Reijo Savola, VTT Technical Research Centre of Finland, Finland
* Jean-Pierre Seifert, Technical University of Berlin & Deutsche Telekom Laboratories, Germany
* Claudio Silvestri, University of Venice, Italy
* Noboru Sonehara, National Institute of Informatics, Japan
* Claudio Soriente, ETH Zürich, Switzerland
* Thorsten Strufe, TU Darmstadt, Germany
* Zhi Wang, Florida State University, USA
* Sven Wohlgemuth, TU Darmstadt/ICRI-SC, Germany

Related Resources

CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
NordSec 2022   The 27th Nordic Conference on Secure IT Systems
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
Electronics SI 2022   Electronics: Special Issue on Cybersecurity and Privacy Issues in Cyber-Physical Systems and Industrial Control Systems
SPACE 2022   12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2022)
EAI SecureComm 2022   18th EAI International Conference on Security and Privacy in Communication Networks
TrustCom 2022   The 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications
SI on ATD&IS II 2022   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
CSP 2023   2023 7th International Conference on Cryptography, Security and Privacy (CSP 2023)