posted by user: LiaEx || 20493 views || tracked by 33 users: [display]

TrustCom 2016 : The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications

FacebookTwitterLinkedInGoogle

Link: http://adnet.tju.edu.cn/TrustCom2016/
 
When Aug 23, 2016 - Aug 26, 2016
Where Tianjin, China
Submission Deadline Apr 30, 2016
Notification Due May 31, 2016
Final Version Due Jul 1, 2016
Categories    commnication networks   trust   security   privacy
 

Call For Papers

With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security and privacy are becoming more and more demanding. Therefore, there is a grand challenge that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. As a result, we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security and privacy at the same time. As useful and innovative technologies, trusted computing and communications are attracting researchers with more and more attention.

The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16) will be held in Tianjin, China on 23-26 August 2016. The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.


Topics of interest include, but not limited to

Trust Track
- Trust semantics, metrics and models
- Trusted computing platform
- Trusted network computing
- Trusted operating systems
- Trusted software and applications
- Trust in social networks
- Trust in e-commerce and e-government
- Trust in mobile and wireless communications
- Risk and reputation management
- Survivable computer systems/networks
- Trust of 5G
- Miscellaneous trust issues

Security Track
- Network security
- Computer security
- Database security
- Web applications security
- Security policy, model and architecture
- Security in social networks
- Security in parallel and distributed systems
- Security in mobile and wireless communications
- Security in grid/cloud/pervasive computing
- Authentication, authorization and accounting
- Security of 5G
- Miscellaneous security issues

Privacy Track
- Privacy in Web-based applications and services
- Privacy in database systems
- Privacy in parallel and distributed systems
- Privacy in grid/cloud/pervasive computing
- Privacy in mobile and wireless communications
- Privacy in e-commerce and e-government
- Privacy in network deployment and management
- Privacy and trust
- Privacy and security
- Privacy and anonymity
- Privacy preservation in 5G
- Miscellaneous privacy issues

Forensics Track
- Anti-forensics
- Biometrics
- Cryptanalysis
- Big data forensics
- CCTV forensics
- Cloud forensics
- Computational forensics
- Cyber-physical system forensics
- Datamining for forensics
- Facial recognition
- Fingerprint forensics
- Image forensics
- Malware forensics
- Mobile app forensics (e.g. Skype, WeChat and Facebook)
- Mobile device forensics
- Multimedia forensics
- Network forensics
- Steganography and steganalysis
- System reverse engineering
- Watermarking


SUBMISSION GUIDELINES
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf). Please submit your paper at http://adnet.tju.edu.cn/TrustCom2016/paper_submission.html

Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Accepted and presented papers will be included in the IEEE CPS Proceedings. Distinguished papers presented at the conference, after further revision, will be recommended to high quality international journals.

IMPORTANT DATES
Submission Deadline: April 15, 2016
Authors Notification: May 31, 2016
Final Manuscript Due: July 1, 2016

ORGANIZATION COMMITTEE
General Chairs
Hai Jin, Huazhong Unievrsity of Science and Technology, China
Nei Kato, Tohoku University, Japan
Tharam Dillion, Latrobe University, Australia

Program Chairs
Yang Xiang, Deakin University, Australia
Kui Ren, University at Buffalo, USA
Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China

Steering and Program Committees
Please see http://adnet.tju.edu.cn/TrustCom2016/

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE COINS 2024   IEEE COINS 2024 - London, UK - July 29-31 - Hybrid (In-Person & Virtual)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
S&P 2025   The 45th IEEE Symposium on Security and Privacy
ACM ICNCC 2024   ACM--2024 The 13th International Conference on Networks, Communication and Computing (ICNCC 2024)
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
CSW 2024   2024 3rd International Conference on Cyber Security
SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI
UCC 2024   The IEEE/ACM International Conference on Utility and Cloud Computing
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)