posted by user: ardagna || 2303 views || tracked by 8 users: [display]

WISTP 2009 : Workshop in Information Security Theory and Practices 2009: Smart Devices, Pervasive Systems, and Ubiquitous Networks

FacebookTwitterLinkedInGoogle


Conference Series : Workshop in Information Security Theory and Practice
 
Link: http://www.wistp.org/
 
When Sep 2, 2009 - Sep 4, 2009
Where Brussels, Belgium
Submission Deadline May 3, 2009
Notification Due Jun 1, 2009
Final Version Due Jun 14, 2009
Categories    security   pervasive systems   ubiquitous networks   smart device
 

Call For Papers

*******************************************************************
We apologize in advance if you receive multiple copies of this CFP.
Please disseminate it to your colleagues that could be interested.
*******************************************************************

Workshop in Information Security Theory and Practices 2009:
Smart Devices, Pervasive Systems, and Ubiquitous Networks

September 1-4, 2009, Brussels, Belgium

Workshop URL: http://www.wistp.org/

*Proceedings will be published by Springer in the LNCS series*

WISTP2009 is:

- Co-Sponsored by IFIP WG 11.2 Small System Security
- Co-Sponsored by the VDE ITG
- Technical sponsorship of the IEEE Systems, Man & Cybernetics Society
Technical Committee on Systems Safety and Security
- In cooperation with the ACM SIGSAC
- Supported by ENISA
- Supported by the Institute for Systems and Technologies of
Information, Control and Communication (INSTICC)


*******************************************************
WISTP 2009 Background and Goals:

With the rapid technological development of information technologies and
with the transition from the common to the next generation networks,
computer systems and especially embedded systems are becoming more
mobile and ubiquitous, increasingly interfacing with the physical world.
Ensuring the security of these complex and yet, resource constraint
systems has emerged as one of the most pressing challenges.
Protecting the privacy of the user immersed in such systems is a
similarly pressing concern.

The aim of this third workshop is to bring together researchers and
practitioners in related areas and to encourage interchange and
cooperation between the research community and the industrial/consumer
community. The workshop will consist of technical paper presentations,
one special session for student papers and several invited talks.

*******************************************************
Topics of interest include, but are not limited to:

A. Smart Devices

* Biometrics, National ID cards
* Embedded Systems Security and TPMs
* Interplay of TPMs and Smart Cards
* Mobile Codes Security
* Mobile Devices Security
* New Applications for Secure RFID Systems
* RFID and NFC Systems Security
* Smart Card Security
* Smart Devices Applications
* Wireless Sensor Node Security

B. Pervasive Systems

* Digital Rights Management (DRM) in pervasive environments
* Information Assurance and Trust Management
* Intrusion Detection and Information Filtering
* Localization Systems Security (Tracking of People and Goods)
* Human and psychological aspects of security
* Mobile Commerce Security
* Privacy Enhancing Technologies
* Security Models and Architecture
* Security Policies (Human-Computer Interaction and Human Behavior
Impact)
* Security Protocols (for Identification and Authentication,
Confidentiality and Privacy, and Integrity)
* Security Measurements
* Secure self-organisation and self-configuration

C. Ubiquitous Networks

* Ad Hoc Networks Security
* Delay-Tolerant Network Security
* Domestic Network Security
* Peer-to-Peer Networks Security
* Security Issues in Mobile and Ubiquitous Networks
* Security of GSM/GPRS/UMTS Systems
* Sensor Networks Security
* Vehicular Network Security
* Wireless Communication Security: Bluetooth, NFC, WiFi, WiMAX, WiMedia,
others


*******************************************************
Awards:
* Best student paper: 800E (sponsored by Vodafone)
* Best workshop paper: 800E (sponsored by Juniper Networks)
* Best innovative technology: 200E + a gift (sponsored by INSTICC)
* Best poster: a local product (sponsored by INSTICC)


*******************************************************
Important Dates:
- Intention of submission: ASAP. Send a mail to
damien.sauveron@unilim.fr
- Intention of attendance: ASAP. Send a mail to
damien.sauveron@unilim.fr
- Paper submission: May 3rd 2009 (23h59 UTC) -firm deadline-
- Notification: June 1st, 2009
- Author Registration: June 12th, 2009
- Camera-ready papers: June 14th, 2009


*******************************************************
SUBMISSION DETAILS:

*Full Papers Submission Details*

Authors are invited to submit original papers (written in english) not
previously published nor submitted in parallel for publication to any
other conference, workshop or journal. All submissions will be subjected
to thorough blind review by at least three reviewers (if the paper
involved a Program Committee member, the paper will be reviewed at least
by five reviewers). All submitted papers should be anonymous with no
author(s) names, affiliations, acknowledgments, nor obvious references.
Each paper should begin with a title, a short abstract, and a list of
keywords, following the template indicated by Springer at:
http://www.springer.de/comp/lncs/authors.html

The papers will be in .pdf format, at most 10 pages long excluding
bibliography and well-marked appendices, and at most 14 pages long in
total, using at least 11-point fonts with reasonable margins. As the
reader should not be required to read any appendices, the paper should
be intelligible even without them.
20 papers will be accepted for presentation at the workshop (they will
be included in the proceedings) and 12 additional papers will be
selected to be presented as A1 poster at the workshop (they will NOT be
included in the Springer proceedings BUT the short papers and the
related poster version will be distributed to workshop participants in
CD-ROM formats).
If a submitted paper is mainly the result of the work of a student
author, this paper could have the chance to be selected as "Best student
paper" (even if the paper has been written with senior co-authors).
To participate to this selection process, please add the word "STUDENT"
in the affiliation field in the submission form.
At least one author of each accepted paper is required to register with
the Conference and present the paper. For authors presenting multiple
papers, one normal registration is valid for up to two papers.
For electronic paper submission please use the following URL:
http://www.wistp.org/wistp2009/iChair/


*Posters/Short Papers Submission Details*

Authors are invited to submit proposals (written in english) for poster
presentations of recent results, work in progress, and new ideas. The
submission should be a short paper and it should be no longer than 4
pages.

Authors of accepted papers will be expected to present their work as a
poster during a special session of the workshop and in parallel to the
workshop sessions.
Accepted short papers and the related poster version will be distributed
to workshop participants in CD-ROM formats.
Each paper should begin with a title, a short abstract, and a list of
keywords, following the template indicated by Springer at:
http://www.springer.de/comp/lncs/authors.html

The papers will be in .pdf format, at most 4 pages using at least
11-point fonts with reasonable margins.

At least one author of each accepted paper is required to register with
the workshop and present the paper. For authors presenting multiple
papers, one normal registration is valid for up to two short papers.

For electronic posters/short papers submission please use the following
URL: http://www.wistp.org/wistp2009SPP/iChair/

For further inquiries, please contact the secretariat at
damien.sauveron@unilim.fr


Workshop Proceedings:

Like for the first editions, accepted papers will be included in the
workshop proceedings, published by Springer in their LNCS
series. Camera-ready versions of the papers should not exceed 10 pages
excluding bibliography and well-marked appendices (14 pages in total)
and must comply with the "Authors Instructions" that can be found at:

http://www.springer.de/comp/lncs/authors.html

We plan to index the proceedings to the DBLP, ISI Proceedings and
Inspec.

*******************************************************
WISTP2009 Committees and Chairs:

##### General chairs #####

* Angelos Bilas, FORTH-ICS, Greece
* Olivier Markowitch, ULB, Belgium

##### Local organisers #####
* Jerome Dossogne. ULB, Belgium
* Olivier Markowitch. ULB, Belgium (chair)
* Naim Qachri. ULB, Belgium

##### Workshop/panel/tutorial chair #####

* Jean-Jacques Quisquater. DICE, Catholic University of Louvain, Belgium

##### Publicity chairs #####
* Claudio Ardagna. Department of Information Technologies, University of
Milan, Italy
* Ioannis G. Askoxylakis. FORTH-ICS, Greece
* Joonsang Baek. Cryptography and Security Department of Institute for
Infocomm Research (I2R), Singapore
* Gerhard Hancke. ISG, Royal Holloway University of London, UK

##### Program chairs #####

* Jaap-Henk Hoepman. TNO and Radboud University Nijmegen, Netherlands
* Chris Mitchell. ISG, Royal Holloway University of London, UK

##### Program Committee #####

* Rafael Accorsi. IIG, University of Freiburg, Germany
* Manfred Aigner. IAIK, Technical University Graz, Austria
* Francois Arnault. XLIM, University of Limoges, France
* Ioannis G. Askoxylakis. FORTH-ICS, Greece
* Christophe Bidan. SSIR, Supelec, France
* Pierre-Francois Bonnefoi. XLIM, University of Limoges, France
* Serge Chaumette. LaBRI, University Bordeaux 1, France
* Estíbaliz Delgado, European Software Institute (ESI), Spain
* Tassos Dimitriou. Athens Information Technology, Greece
* Pierre Dusart. XLIM, University of Limoges, France
* Eduardo Fernandez-Medina Paton. Alarcos Research Group, University of
Castilla-La Mancha, Spain
* Sara Foresti. Department of Information Technologies, University of
Milan, Italy
* Flavio Garcia. Radboud University Nijmegen, Netherlands
* Theodoulos Garefalakis. Department of Mathematics, University of
Crete, Greece
* Dieter Gollmann. Security in Distributed Applications, Institutes of
the TU Hamburg-Harburg, Germany
* Stefanos Gritzalis. Info-Sec-Lab, University of the Aegean, Greece
* Gerhard Hancke. ISG, Royal Holloway University of London, UK
* Olivier Heen. INRIA, France
* Sotiris Ioannidis. FORTH-ICS & University of Crete, Greece
* Sokratis Katsikas. Dept. of Technology Education & Digital Systems,
University of Piraeus, Greece
* Evangelos Kranakis. Carleton University, Canada
* Deok-Gyu Lee. Information Security Technoogy Division, Electronics and
Telecommunications Research Institute, Korea
* Konstantinos Markantonakis. ISG-SCC, Royal Holloway University of
London, UK
* Fabio Martinelli. Information Security Group, IIT-CNR, Italy
* Keith Mayes. ISG-SCC, Royal Holloway University of London, UK
* Jan de Meer. smartspacelab.eu, Brandenburg Technical University (BTU),
Germany
* Sjouke Mauw. SATOSS of Computer Science and Communications, University
of Luxembourg, Luxembourg
* Stefaan Motte. NXP Semiconductors, Belgium
* Jose Onieva. Computer Science Department, University of Malaga, Spain
* Rolf Oppliger. eSECURITY Technologies, Switzerland
* Pierre Paradinas. INRIA & CNAM, France
* Erik Poll. SOS (Security of Systems) group of the Radboud University
Nijmegen, Netherlands
* Joachim Posegga. Institute for IT Security and Security Law,
University of Passau, Germany
* Jean-Jacques Quisquater. DICE, Catholic University of Louvain, Belgium
* Kai Rannenberg. Chair of Mobile Commerce and Multilateral Security,
Goethe University Frankfurt, Germany
* Konstantinos Rantos. GSPAEG at the Hellenic Ministry of Interior,
Public Administration and Decentralisation, Greece
* Damien Sauveron. XLIM, University of Limoges, France
* Frank Stajano. Computer Laboratory of the University of Cambridge, UK
* Michael Tunstall. Department of Electrical and Electronic Engineering,
University College Cork, Ireland
* Paulo Jorge Esteves Veríssimo. University of Lisboa, Portugal
* Erik Zenner. Technical University of Denmark, Danemark
* Alf Zugenmaier. Docomo research labs, Germany

##### Steering committee #####
* Angelos Bilas. FORTH-ICS & University of Crete, Greece
* Serge Chaumette. LaBRI, University Bordeaux 1, France
* Dieter Gollmann. Security in Distributed Applications, Institutes of
the TU Hamburg-Harburg, Germany
* Konstantinos Markantonakis. ISG-SCC, Royal Holloway University of
London, UK
* Jean-Jacques Quisquater. DICE, Catholic University of Louvain, Belgium
* Damien Sauveron. XLIM, University of Limoges, France

*******************************************************
Keynote Speakers:

- TBA

*******************************************************
Opportunities for students:

To help the students looking for a PhD thesis or a postdoctoral
position, we will propose them to add a colorized sticker on their
badge. In the same way, we will propose to persons offering these
positions to add a sticker with a different color. We hope this
mechanism will help to support the exchanges between young and senior
researchers.

*******************************************************
SPONSORSHIP AND SUPPORT:

- Eurosmart
- INSTICC
- Juniper Networks
- MASTER FP7 project (Silver Sponsor)
- SCM Microsystems
- Vodafone


*******************************************************
We hope you will be interested by this event.
For further inquiries, please contact the secretariat at
damien.sauveron@unilim.fr

Related Resources

ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
DSN 2019   Dependable Systems and Networks
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11
ITCE 2019   The International Conference on Innovative Trends in Computer Engineering
IEEE S&P 2019   IEEE Symposium on Security and Privacy
NECO 2018   7th International Conference of Networks and Communications
ACNS 2019   International Conference on Applied Cryptography and Network Security
MLCS-MDPI 2019   Special issue on Machine Learning for Cyber-Security (MDPI Journal of INFORMATION)
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI