posted by user: saraforesti || 2342 views || tracked by 4 users: [display]

WISTP 2014 : 8th Workshop in Information Security Theory and Practice (WISTP 2014)


Conference Series : Workshop in Information Security Theory and Practice
When Jun 30, 2014 - Jul 2, 2014
Where Heraklion, Greece
Submission Deadline Mar 14, 2014
Notification Due Apr 7, 2014
Final Version Due Apr 21, 2014

Call For Papers

*** Deadline extended to March 14, 2014 (midnight Samoa time) ***


Securing Internet of Things
June 30 - July 02, 2014, Heraklion, Greece -

Future ICT technologies, such as the concepts of Ambient Intelligence,
Cyber-physical Systems and Internet of Things provide a vision of the
Information Society in which: a) people and physical systems are
surrounded with intelligent interactive interfaces and objects, and b)
environments are capable of recognising and reacting to the presence of
different individuals or events in a seamless, unobtrusive and invisible
manner. The success of future ICT technologies will depend on how secure
these systems may be, to what extent they will protect the privacy of
individuals and how individuals will come to trust them. WISTP 2014
aims to address security and privacy issues of smart devices, networks,
architectures, protocols, policies, systems, and applications related to
Internet of Things, along with evaluating their impact on business,
individuals, and the society.

The workshop seeks original submissions from academia and industry
presenting novel research on all theoretical and practical aspects
of security and privacy of Internet of Things, as well as experimental
studies of fielded systems, the application of security technology,
the implementation of systems, and lessons learned.
We encourage submissions from other communities such as law, business,
and policy that present these communities' perspectives on
technological issues. Topics of interest include,
but are not limited to:

* Security and Privacy in Smart Devices
- Biometrics, National ID cards
- Embedded Systems Security and TPMs
- Interplay of TPMs and Smart Cards
- Mobile Codes Security
- Mobile Devices Security
- Mobile Malware
- Mobile OSes Security Analysis
- New Applications for Secure RFID Systems
- RFID Systems
- Smart Card
- Smart Devices Applications
- Wireless Sensor Node

* Security and Privacy in Networks
- Ad Hoc Networks
- Delay-Tolerant Network
- Domestic Network
- Peer-to-Peer Networks
- Security Issues in Mobile and Ubiquitous Networks
- Sensor Networks: Campus Area, Body Area, Sensor and
Metropolitan Area Networks
- Vehicular Network
- Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others

* Security and Privacy in Architectures, Protocols, Policies,
Systems and Applications
- BYOD Contexts
- Cloud-enhanced Mobile Security
- Critical Infrastructure (e.g. for Medical or Military Applications)
- Cyber-Physical Systems
- Digital Rights Management (DRM)
- Distributed Systems and Grid Computing
- Information Assurance and Trust Management
- Intrusion Detection and Information Filtering
- Lightweight cryptography
- Localization Systems (Tracking of People and Goods)
- M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human)
- Mobile Commerce
- Multimedia Applications
- Public Administration and Governmental Services
- Pervasive Systems
- Privacy Enhancing Technologies
- Secure self-organization and self-configuration
- Security Models, Architecture and Protocol: for Identification
and Authentication, Access Control, Data Protection
- Security Policies (Human-Computer Interaction and Human Behavior Impact)
- Security Measurements
- Smart Cities
- Systems Controlling Industrial Processes

Paper Submission due: March 14, 2014 (midnight Samoa time) *FIRM*
Notification to authors: April 7, 2014
Author registration: April 21, 2014
Camera ready due: April 21, 2014

Submissions must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or
conference/workshop with proceedings. Each submission should be
at most 16 pages in total in the Springerís LNCS format
All submissions should be anonymous (i.e., no author names/affiliations
and obvious citations). Submissions are to be made to the submission
web site ( Only PDF files will
be accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Accepted papers will be published
by Springer in the Lecture Notes in Computer Science series
(, and the proceedings will be
available at the workshop. The camera-ready version of the accepted
papers must follow Springer guidelines (a Latex source file will
be required).

If a submitted paper is mainly the work of a student author, this paper
is eligible for the best student paper award. To participate in this
selection process, please add the word "STUDENT" in the affiliation
field in the submission form.

Authors of accepted papers must guarantee that their papers will be
presented at the workshop. At least one author of each accepted paper is
required to register with the workshop and present the paper. For authors
presenting multiple papers, one normal registration is valid for up to
two papers.

* Bart Preneel, Katholieke Universiteit Leuven, Belgium
* Timo Kasper, Ruhr-Universit‰t Bochum, Germany

General Chair
* Ioannis Askoxylakis, FORTH-ICS, Greece

Local Organizers
* Nikolaos Petroulakis, FORTH-ICS, Greece

Workshop/Panel/Tutorial Chair

Publicity Chairs
* Sara Foresti, Universita` degli Studi di Milano, Italy
* Cheng-Kang Chu, Huawei, Singapore
* to be extended

Program Chairs
* David Naccache, Ecole Normale SupÈrieure, France
* Damien Sauveron, XLIM, University of Limoges, France

Program Committee
* Raja Naeem Akram, University of Waikato, NZ
* Claudio A. Ardagna, Universita` degli Studi di Milano, Italy
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Gildas Avoine, INSA de Rennes, France
* Lejla Batina, Radboud University Nijmegen, The Netherlands
* Lorenzo Cavallaro, Royal Holloway, University of London, UK
* Herve' Chabanne, Morpho, France
* Serge Chaumette, LaBRI, University Bordeaux 1, France
* Mauro Conti, University of Padua, Italy
* Manuel Egele, Carnegie Mellon University, USA
* Jose' Maria de Fuentes, Carlos III University of Madrid, Spain
* Flavio Garcia, University of Birmingham, UK
* Dieter Gollmann, Hamburg University of Technology, Germany
* Johann Groszschadl, Universitat Luxemburg, Luxembourg
* Yong Guan, Iowa State University, USA
* Gerhard Hancke, City University of Hong Kong, Hong Kong
* Suleyman Kardas, TUBITAK BILGEM UEKAE, Turkey
* Issa Mohammad Khalil, Qatar Fondation, Qatar
* Ioannis Krontiris, Goethe University Frankfurt, Germany
* Andrea Lanzi, Insitut Eurecom, France
* Corrado Leita, Symantec Research Labs, France
* Albert Levi, Sabanci University, Turkey
* Peng Liu, Pennsylvania State University, USA
* Javier Lopez, Computer Science Department, University of Malaga, Spain
* Federico Maggi, Politecnico di Milano, Italy
* Vashek Matyas, Masaryk University, Czech Republic
* Sjouke Mauw, University of Luxembourg, Luxembourg
* Aikaterini Mitrokotsa, Chalmers University of Technology, Sweden
* Flemming Nielson, Technical University of Denmark, Denmark
* Vladimir A Oleshchuk, University of Agder, Norway
* Milan Petkovic, Eindhoven University of Technology, The Netherlands
* Frank Piessens, Katholieke Universiteit Leuven, Belgium
* Wolter Pieters, TU Delft, The Netherlands
* Henrich C. Pohls, Institute of IT Security and Security Law at the
University of Passau, Germany
* David Pointcheval, ENS Computer Science Department, France
* Christina Popper, Ruhr-University Bochum, Germany
* Axel York Poschmann, Nanyang Technological University, Singapore
* Jean-Jacques Quisquater, UCL Crypto Group, Louvain-la-Neuve, Belgium
* Kui Ren, State University of New York at Buffalo, USA
* Vincent Rijmen, University of Leuven, Belgium
* Reihaneh Safavi-Naini, University of Calgary, Canada
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita` degli Studi di Milano, Italy
* Seungwon Shin, KAIST, Korea
* Jose Maria Sierra, Carlos III University of Madrid, Spain
* Asia Slowinska, Vrije Universiteit Amsterdam, The Netherlands
* Willy Susilo, University of Wollongong, Australia
* Michael Tunstall, Cryptography Research Inc, USA
* Umut Uludag, TUBITAK-BILGEM UEKAE, Turkey
* Stefano Zanero, Politecnico di Milano, Italy
* Jianying Zhou, Institute for Infocomm Research, Singapore
* to be extended

WISTP Steering Committee
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Lorenzo Cavallaro, Royal Holloway, University of London, UK
* Dieter Gollmann, Hamburg University of Technology, Germany
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway Univ. of London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France

* Co-Sponsored by IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at

This call for papers and additional information about the conference
can be found at
Program chairs can be contacted at

Related Resources

CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
ETAPS 2017   European Joint Conferences on Theory and Practice of software
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
ACISP 2017   Australasian Conference on Information Security and Privacy
WISTP 2016   10th WISTP International Conference on Information Security Theory and Practice
DNC2 2017   DiscourseNet Congress #2 - Interdisciplinary Discourse Studies: Theory and Practice
ECML-PKDD 2017   European Conference on Machine Learning and Principles and Practice of Knowledge Discovery
ICITA 2017   International Conference on Information Technology and Applications
PODS 2017   36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems
IPMU 2018   17th Information Processing and Management of Uncertainty in Knowledge-Based Systems Conference