posted by organizer: bejohns6 || 3392 views || tracked by 5 users: [display]

WEARABLE-S&P 2015 : 1st Workshop on Wearable Security and Privacy


When Jan 30, 2015 - Jan 30, 2015
Where Isla Verde, Puerto Rico
Submission Deadline Oct 16, 2014
Notification Due Nov 16, 2014
Final Version Due Dec 31, 2014
Categories    wearable computing   security   privacy

Call For Papers

The 1st Workshop on Wearable Security and Privacy will be held January 30, 2015 at the InterContinental San Juan Hotel in Isla Verde, Puerto Rico, in association with Financial Crypto 2015. This workshop focuses on the unique challenges of security and privacy for wearable devices.

The demand for a variety of technologies in wearable devices has increased in recent years. Products ranging from Google glass, to EEG brainwave signal readers, to heart rate monitors, have opened up many new applications, but also give rise to concerns involving security and privacy. This workshop seeks papers addressing the unique challenges of security and privacy for wearable computing devices. Suggested topics include (but are not limited to) empirical and theoretical studies of:

- Novel biometrics
- Behavioral biometrics
- Multi-factor authentication with wearable sensors
- Usability of wearable authentication
- Robustness of wearable authentication systems
- Wearable payment systems
- Bio-cryptographic security protocols
- Attacks against wearable systems
- User impact of attacks on wearable systems
- Access control for wearable data sharing
- User testing of wearable security features
- Economics of security for wearable technologies
- Body worn cameras and sousveillance
- Augmented reality security and privacy
- Privacy of pervasive eye-tracking
- Understanding user privacy concerns for wearable technologies
- User testing of privacy features for wearable technologies
- Privacy notifications for wearable recording devices
- Economics of privacy for wearable technologies

Paper Submission Deadline:  October 16, 2014
Author Notification:  November 16, 2014
Final Papers:  December 31, 2014
Workshop:  January 30, 2015

The workshop solicits submissions of manuscripts that represent significant and novel research contributions. Submissions must not substantially overlap with works that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Submissions should follow the Springer Lecture Notes in Computer Science format. Regular submissions should be no more than 15 pages including references and well-marked appendices. Shorter submissions of up to 6 pages may also be submitted as short papers. Accepted papers will appear in the proceedings published by Springer Lecture Notes in Computer Science. Authors who seek to submit their works to journals may opt-out by publishing an extended abstract only.

Program Committee

Alessandro Acquisti, CMU
Srdjan Capkun, ETH Zurich
John Chuang, UC Berkeley (co-chair)
Cory Cornelius, Intel Labs
Yves-Alexandre de Montjoye, MIT
Benjamin Johnson, CMU (co-chair)
Jaeyeon Jung, Microsoft Research
Apu Kapadia, Indiana University Bloomington
Krishna Ksheerabdhi, Gemalto
Ivan Martinovic, University of Oxford
Tara Mathews, Google
Franziska Roesner, University of Washington

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IJCSITY 2017   International Journal of Computational Science and Information Technology
IMWUT (4) 2017   Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (4)
Social Media 2018   IEEE International Conference on Social Media, Wearable and Web Analytics
AH2018   The 9th Augmented Human International Conference
MathSJ 2017   Applied Mathematics and Sciences: An International Journal
ASPMI 2018   Advances in Security and Privacy of Multimodal Interfaces
ICSS 2017   3rd International Conference on Software Security