posted by organizer: bejohns6 || 3458 views || tracked by 5 users: [display]

WEARABLE-S&P 2015 : 1st Workshop on Wearable Security and Privacy


When Jan 30, 2015 - Jan 30, 2015
Where Isla Verde, Puerto Rico
Submission Deadline Oct 16, 2014
Notification Due Nov 16, 2014
Final Version Due Dec 31, 2014
Categories    wearable computing   security   privacy

Call For Papers

The 1st Workshop on Wearable Security and Privacy will be held January 30, 2015 at the InterContinental San Juan Hotel in Isla Verde, Puerto Rico, in association with Financial Crypto 2015. This workshop focuses on the unique challenges of security and privacy for wearable devices.

The demand for a variety of technologies in wearable devices has increased in recent years. Products ranging from Google glass, to EEG brainwave signal readers, to heart rate monitors, have opened up many new applications, but also give rise to concerns involving security and privacy. This workshop seeks papers addressing the unique challenges of security and privacy for wearable computing devices. Suggested topics include (but are not limited to) empirical and theoretical studies of:

- Novel biometrics
- Behavioral biometrics
- Multi-factor authentication with wearable sensors
- Usability of wearable authentication
- Robustness of wearable authentication systems
- Wearable payment systems
- Bio-cryptographic security protocols
- Attacks against wearable systems
- User impact of attacks on wearable systems
- Access control for wearable data sharing
- User testing of wearable security features
- Economics of security for wearable technologies
- Body worn cameras and sousveillance
- Augmented reality security and privacy
- Privacy of pervasive eye-tracking
- Understanding user privacy concerns for wearable technologies
- User testing of privacy features for wearable technologies
- Privacy notifications for wearable recording devices
- Economics of privacy for wearable technologies

Paper Submission Deadline:  October 16, 2014
Author Notification:  November 16, 2014
Final Papers:  December 31, 2014
Workshop:  January 30, 2015

The workshop solicits submissions of manuscripts that represent significant and novel research contributions. Submissions must not substantially overlap with works that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should follow the Springer Lecture Notes in Computer Science format. Regular submissions should be no more than 15 pages including references and well-marked appendices. Shorter submissions of up to 6 pages may also be submitted as short papers. Accepted papers will appear in the proceedings published by Springer Lecture Notes in Computer Science. Authors who seek to submit their works to journals may opt-out by publishing an extended abstract only.

Program Committee

Alessandro Acquisti, CMU
Srdjan Capkun, ETH Zurich
John Chuang, UC Berkeley (co-chair)
Cory Cornelius, Intel Labs
Yves-Alexandre de Montjoye, MIT
Benjamin Johnson, CMU (co-chair)
Jaeyeon Jung, Microsoft Research
Apu Kapadia, Indiana University Bloomington
Krishna Ksheerabdhi, Gemalto
Ivan Martinovic, University of Oxford
Tara Mathews, Google
Franziska Roesner, University of Washington

Related Resources

Social Media 2018   IEEE International Conference on Social Media, Wearable and Web Analytics
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
AH2018   The 9th Augmented Human International Conference
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
EmotionAware 2018   2nd International Workshop on Emotion Awareness for Pervasive Computing with Mobile and Wearable Devices
MathSJ 2018   Applied Mathematics and Sciences: An International Journal
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
SciSec 2018   The 1st International Conference on Science of Cyber Security
DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications