posted by organizer: bejohns6 || 2977 views || tracked by 5 users: [display]

WEARABLE-S&P 2015 : 1st Workshop on Wearable Security and Privacy


When Jan 30, 2015 - Jan 30, 2015
Where Isla Verde, Puerto Rico
Submission Deadline Oct 16, 2014
Notification Due Nov 16, 2014
Final Version Due Dec 31, 2014
Categories    wearable computing   security   privacy

Call For Papers

The 1st Workshop on Wearable Security and Privacy will be held January 30, 2015 at the InterContinental San Juan Hotel in Isla Verde, Puerto Rico, in association with Financial Crypto 2015. This workshop focuses on the unique challenges of security and privacy for wearable devices.

The demand for a variety of technologies in wearable devices has increased in recent years. Products ranging from Google glass, to EEG brainwave signal readers, to heart rate monitors, have opened up many new applications, but also give rise to concerns involving security and privacy. This workshop seeks papers addressing the unique challenges of security and privacy for wearable computing devices. Suggested topics include (but are not limited to) empirical and theoretical studies of:

- Novel biometrics
- Behavioral biometrics
- Multi-factor authentication with wearable sensors
- Usability of wearable authentication
- Robustness of wearable authentication systems
- Wearable payment systems
- Bio-cryptographic security protocols
- Attacks against wearable systems
- User impact of attacks on wearable systems
- Access control for wearable data sharing
- User testing of wearable security features
- Economics of security for wearable technologies
- Body worn cameras and sousveillance
- Augmented reality security and privacy
- Privacy of pervasive eye-tracking
- Understanding user privacy concerns for wearable technologies
- User testing of privacy features for wearable technologies
- Privacy notifications for wearable recording devices
- Economics of privacy for wearable technologies

Paper Submission Deadline:  October 16, 2014
Author Notification:  November 16, 2014
Final Papers:  December 31, 2014
Workshop:  January 30, 2015

The workshop solicits submissions of manuscripts that represent significant and novel research contributions. Submissions must not substantially overlap with works that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should follow the Springer Lecture Notes in Computer Science format. Regular submissions should be no more than 15 pages including references and well-marked appendices. Shorter submissions of up to 6 pages may also be submitted as short papers. Accepted papers will appear in the proceedings published by Springer Lecture Notes in Computer Science. Authors who seek to submit their works to journals may opt-out by publishing an extended abstract only.

Program Committee

Alessandro Acquisti, CMU
Srdjan Capkun, ETH Zurich
John Chuang, UC Berkeley (co-chair)
Cory Cornelius, Intel Labs
Yves-Alexandre de Montjoye, MIT
Benjamin Johnson, CMU (co-chair)
Jaeyeon Jung, Microsoft Research
Apu Kapadia, Indiana University Bloomington
Krishna Ksheerabdhi, Gemalto
Ivan Martinovic, University of Oxford
Tara Mathews, Google
Franziska Roesner, University of Washington

Related Resources

IEEE S&P 2016   37th IEEE Symposium on Security and Privacy
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
IEEE S&P 2017   38th IEEE Symposium on Security and Privacy
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
IJISS 2016   International Journal of Information Security Science (IJISS)
IJMSA 2016   International Journal of Modelling, Simulation and Applications
ACISP 2017   Australasian Conference on Information Security and Privacy