posted by user: freefrag1980 || 6737 views || tracked by 8 users: [display]

WISTP 2017 : 11th International Conference on Information Security Theory and Practice

FacebookTwitterLinkedInGoogle


Conference Series : Workshop in Information Security Theory and Practice
 
Link: http://www.wistp.org/
 
When Sep 28, 2017 - Sep 29, 2017
Where Heraklion, Crete
Submission Deadline Jun 29, 2017
Notification Due Jul 31, 2017
Final Version Due Aug 15, 2017
Categories    information security   security   privacy
 

Call For Papers

The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017) seeks original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues.

In 2007, Workshop in Information Security Theory and Practice (WISTP) was created as a forum for bringing together researchers and practitioners in related areas and to encourage interchange and cooperation between the research community and the industrial/consumer community. From 2015, due to increased participation it has become a Conference.

Submissions with regards to the security of future ICT technologies, such as cyber-physical systems, cloud services, data science and the Internet of Things are particularly welcome.

Other topics of interest include, but are not limited to:

* Security and Privacy in Smart Devices
- Biometrics, National ID cards
- Embedded Systems Security and TPMs
- Interplay of TPMs and Smart Cards
- Mobile Codes Security
- Mobile Devices Security
- Mobile Malware
- Mobile OSes Security Analysis
- New Applications for Secure RFID Systems
- RFID Systems
- Smart Card
- Smart Devices Applications
- Wireless Sensor Node

* Security and Privacy in Networks
- Ad Hoc Networks
- Delay-Tolerant Network
- Domestic Network
- GSM/GPRS/UMTS Systems
- Peer-to-Peer Networks
- Security Issues in Mobile and Ubiquitous Networks
- Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks
- Vehicular Network
- Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others

* Security and Privacy in Architectures, Protocols, Policies, Systems and Applications
- BYOD Contexts
- Cloud-enhanced Mobile Security
- Critical Infrastructure (e.g. for Medical or Military Applications)
- Cyber-Physical Systems
- Digital Rights Management (DRM)
- Distributed Systems and Grid Computing
- Information Assurance and Trust Management
- Intrusion Detection and Information Filtering
- Lightweight cryptography
- Localization Systems (Tracking of People and Goods)
- M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to
Human)
- Mobile Commerce
- Multimedia Applications
- Public Administration and Governmental Services
- Pervasive Systems
- Privacy Enhancing Technologies
- Secure self-organization and self-configuration
- Security Models, Architecture and Protocol: for Identification and Authentication, Access Control, Data Protection
- Security Policies (Human-Computer Interaction and Human Behavior Impact)
- Security Measurements
- Smart Cities
- Systems Controlling Industrial Processes

SUBMISSION INSTRUCTIONS
--------------------------
Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most 16 pages in total in the Springer LNCS format.

For detailed instructions please see the website.

Related Resources

DISP 2018   Special Issue on Data Intelligence in Security and Privacy, Journal of Information Security and Applications
MathSJ 2018   Applied Mathematics and Sciences: An International Journal
ICONIP 2018   25th International Conference on Neural Information Processing
ECTIJ 2018   Economics, Commerce and Trade Management: An International Journal
ECIIC 2018   10th European Conference on Intangibles and Intellectual Capital
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
SI: Cloud-Big Data (SIMPAT) 2018   Special Issue on Modeling and Simulation of Cloud Computing and Big Data, Simulation Modelling Practice and Theory, Elsevier
PST 2018   The Sixteen International Conference on Privacy, Security and Trust (PST)
eCrime 2018   IEEE 13th Symposium on Electronic Crime Research
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses