| |||||||||||||||
Connect Security World 2017 : Connect Security World, Embedding Trust in IoT Systems and Connected Hardware | |||||||||||||||
Link: http://www.connectsecurityworld.com | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
In its 6th edition, Connect Security World invites digital security experts and IoT developers to explore by-design security technologies and approaches for the IoT frameworks.
The PROGRAM COMMITTEE is selecting 70+ speakers to address IoT security from sensors to Cloud, from design and development to deployment: - TRUSTED TECHNOLOGIES: Hardware & embedded software security • Encryption technology • Secure Cloud of things • Identity of things • IoT Network security - METHODS & BEST PRACTICES: IoT security analysis and audit • End-to-end security • Privacy by design - REGULATION & STANDARDS: •Standardization & interoperability •Government-Industry cooperation - APPLICATIONS SECURITY in Critical infrastructures • Automotive •Smart Home and consumer appliances •Wearables •e-Health & medical appliances >>>> For full details and guidelines, view the CALL FOR SPEAKERS: http://www.connectsecurityworld.com/call-for-speakers |
|