posted by user: mpirker || 6525 views || tracked by 11 users: [display]

InTrust 2013 : 5th International Conference on Trusted Systems


Conference Series : International Conference on Trusted Systems
When Dec 5, 2013 - Dec 6, 2013
Where Graz, Austria
Submission Deadline Jul 29, 2013
Notification Due Aug 26, 2013
Final Version Due Sep 16, 2013
Categories    trust   security   mobile

Call For Papers

Call for Papers

InTrust 2013: 5th International Conference on Trusted Systems
5-6th December 2013, Graz, Austria

The InTrust conference focuses on the theory, technologies and
applications of trusted systems. It is devoted to all aspects of
trusted computing systems, including trusted modules, platforms,
networks, services and applications, from their fundamental features
and functionalities to design principles, architecture and
implementation technologies. The goal of the conference is to bring
academic and industrial researchers, designers, and implementers
together with end-users of trusted systems, in order to foster the
exchange of ideas in this challenging and fruitful area.

InTrust 2013 will take place on 5th and 6th December 2013. The
conference will be hosted by the Institute for Applied Information
Processing and Communications (IAIK) of Graz University of
Technology (TUG). InTrust 2013 solicits original papers on any
aspect of the theory, advanced development and applications of
trusted computing, trustworthy systems and general trust issues in
modern computing systems.

Submissions must not substantially duplicate work that any of the
authors have published elsewhere or have submitted in parallel to
any journal or other conference or workshop that has proceedings.
All submissions will be blind-reviewed. Papers must be anonymous,
with no author names, affiliations, acknowledgements, or obvious
references. A submitted paper should begin with a title, a short
abstract, and a list of keywords.

The proceedings of InTrust 2013 will be published in the Springer-
Verlag Lecture Notes in Computer Science series. Papers published in
the LNCS series are indexed by both EI and ISTP. Clear instructions
for the preparation of a final proceedings version will be sent to
the authors of accepted papers. Papers should be submitted in
standard LNCS format, with length at most 15 pages (excluding
bibliography and appendices). Committee members are not required to
review more pages than this, so papers should be intelligible within
this length. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Authors of accepted papers
must guarantee that their paper will be presented at the conference.
Papers must be submitted in PDF format using the EasyChair
conference management system at

Please send any enquiries to:

The conference has a best paper award to the value of US$1,000,
sponsored by Beijing Institute of Technology; all papers are
eligible for this award.

Topics of relevance include but are not limited to:
* Fundamental features and functionalities of trusted systems
* Primitives and mechanisms for building a chain of trust
* Design principles and architectures for trusted modules and
* Trustworthy infrastructures and cloud computing services
* Implementation technologies for trusted modules and platforms
* Cryptographic aspects of trusted systems, including cryptographic
algorithms and protocols, and their implementation and application
in trusted systems
* Secure network operation
* Mobile trusted systems
* Applications of trusted systems
* Trusted intellectual property protection: metering, watermarking,
digital rights management and enterprise rights management
* Software & hardware protection for trusted systems
* Authentication and access control for trusted systems
* Identity & privacy aspects of trusted systems
* Attestation for trusted systems, including measurement and
verification of the behavior of trusted systems
* Emerging technologies and standards for trusted systems
* Trust metrics and robust trust inference in distributed systems
* Usability and reliability aspects of trusted systems
* Trust modeling, economic analysis and protocol design for rational
and malicious adversaries
* Virtualization for trusted systems
* Limitations of trusted systems
* Security analysis of trusted systems, including formal methods
proofs, provable security and automated analysis
* Security policies for, and management of, trusted systems
* Intrusion resilience and revocation aspects of trusted systems
* Scalability aspects of trusted systems
* Compatibility aspects of trusted systems
* Experiences in building real-world trusted systems
* Socio-economic aspects of trusted systems

Key dates
EXTENDED Deadline for submissions: Monday, 29 July 2013(!)
Notifications to authors: Monday, 26 August 2013
Camera ready due: Monday, 16 September 2013
Opening of conference: Thursday, 5 December 2013

Program Committee Chairs
Roderick Bloem, Graz University of Technology, Austria
Peter Lipp, Graz University of Technology, Austria

Program Committee
Liqun Chen, HP Laboratories, UK
Zhong Chen, Peking University, China
Xuhua Ding, SMU, Singapore
Loic Duflot, SGDN, France
Dieter Gollmann, TU Hamburg-Harburg, Germany
Sigrid Guergens, Fraunhofer SIT, Germany
Stefan Katzenbeisser, TU Darmstadt, Germany
Dirk Kuhlmann, HP Laboratories, UK
Xuejia Lai, Shanghai Jiao Tong University, China
Mario Lamberger, NXP, Austria
Jiangtao Li, Intel, USA
Javier Lopez, University of Malaga, Spain
Stefan Mangard, Infineon, Germany
Andrew Martin, University of Oxford, UK
Shin'Ichiro Matsuo, NICT, Japan
Chris Mitchell, RHUL, UK
Yi Mu, University of Wollongong, Australia
Martin Pirker, Graz University of Technology, Austria
Graeme Proudler, HP Laboratories, UK
Scott Rotondo, Oracle, USA
Mark Ryan, University of Birmingham, UK
Willy Susilo, University of Wollongong, Australia
Ronald Toegl, Graz University of Technology, Austria
Claire Vishik, Intel, UK
Jian Weng, Jinan University, China
Marcel Winandy, Ruhr-University Bochum, Germany
Xinwen Zhang, Huawei Research Center, USA
Yongbin Zhou, Chinese Academy of Sciences, China
Liehuang Zhu, Beijing Institute of Technology, China
Yan Zhu, Peking University, China

Steering Committee
Yongfei Han, BJUT & ONETS, China
Moti Yung, Google & Columbia University, USA
Liqun Chen, HP Laboratories, UK
Robert Deng, SMU, Singapore
Chris Mitchell, RHUL, UK

Local Organizers
Martina Piewald
Martin Pirker
Ronald Toegl

Beijing Institute of Technology

Related Resources

ICSRS--Scopus & EI Compendex 2021   2021 5th International Conference on System Reliability and Safety (ICSRS 2021)--Scopus & EI Compendex
IEEE COINS 2021   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
WAISE 2021   4th International Workshop on Artificial Intelligence Safety Engineering
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
UVS-Oman 2022   The 2nd International Conference on Unmanned Vehicle Systems (UVS-Oman 2022) - IEEE
IJCIS 2021   International Journal on Cryptography and Information Security
AICCC--EI, Scopus 2021   2021 4th Artificial Intelligence and Cloud Computing Conference (AICCC 2021)--EI Compendex, Scopus
JEDT 2021   International Journal of Electronic Design and Test
UBICOMM 2021   The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
WiMoA 2021   3th International Conference on Wireless, Mobile Network and Applications