posted by organizer: waikatocsl || 15517 views || tracked by 28 users: [display]

TrustCom 2019 : The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications


When Aug 5, 2019 - Aug 8, 2019
Where Rotorua, New Zealand
Submission Deadline Mar 14, 2019
Notification Due Apr 26, 2019
Final Version Due May 27, 2019
Categories    trust   security   privacy   cybersecurity

Call For Papers

TrustCom 2019 Call For Papers

In a fast-growing cyber security threat landscape, game-changing techniques in information security, trust, privacy and forensics are required for a sustainable future. CROW and STRATUS are proud to host the 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-19) which will be held at Rotorua, New Zealand on 5-8 August 2019.

As a leading international conference in the area of trust, information security and privacy, and forensics, the IEEE TrustCom 2019 conference aims to bring together international researchers and practitioners working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks – providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.

Topics of interest include, but not limited to:

Trust Track
Trust semantics, metrics and models, Trusted computing platform, Trusted network computing, Trusted operating systems, Trusted software and applications, Trust in social networks, Trust in e-commerce and e-government, Trust in mobile and wireless communications, Trust in automotive environments, Trust visualization, Risk and reputation management, Survivable computer systems/networks, Trust of 5G, Hardware for chains and roots of trust, Software trustworthiness and quality, Provenance for trust, Novel techniques in provenance

Security Track
Network security, Computer security, Database security, Hardware security, Side-Channel attacks, Fault attacks, Obfuscation and reverse engineering, Web applications security, Machine learning applied to security applications, Security policy, model and architecture, Security in social networks, Security in parallel and distributed systems, Security in mobile and wireless communications, Security of 5G, Security in grid/cloud/pervasive/fog/edge computing, Authentication, authorization and accounting, Emerging topics in information security and applied cryptography, Miscellaneous security issues, Provenance for security, Emerging topics in security attribution, Consumer/User-centric security 

Privacy Track
Privacy in Web-based applications and services, Privacy in database systems, Privacy in parallel and distributed systems, Privacy in grid/cloud/pervasive computing, Privacy in mobile and wireless communications, Privacy in e-commerce and e-government, Privacy in network deployment and management, Privacy and policy conformance (GDPR, HIPPA, etc.), Privacy and trust, Privacy and security, Privacy and anonymity, Privacy preservation in 5G, Privacy in surveillance systems, Miscellaneous privacy issues, Consumer/User-centric privacy

Forensics and Analytics Track
Anti-forensics, Biometrics, Cryptanalysis, Big data forensics, CCTV forensics, Cloud forensics, Computational forensics, Cyber-physical system forensics, Data Mining for forensics, Facial recognition, Fingerprint forensics, Image forensics, Malware forensics, Mobile app forensics (e.g. Skype, WeChat and Facebook), Mobile device forensics, Multimedia forensics, Network forensics, Steganography and steganalysis, System reverse engineering, Watermarking, Automotive Forensics, Behavioural biometrics 

Emerging Technologies
Blockchain security and privacy, Blockchain consensus, Blockchain implementation, Blockchain based IoT security solutions, Blockchain in cyber physical systems, Blockchain in social networking, Directed Acyclic Graph (DAG) distributed ledger, Smart contract, Cryptocurrencies security and privacy, IoT security and privacy, Attacks in blockchain/cryptocurrency , IoT implementations for security and privacy, Industry Control systems, Post-quantum cryptography , Security models for the post-quantum era, Implementations of post-quantum cryptosystems, Cyber insurance technologies, Emerging and disruptive technologies for security, privacy, trust and forensics.

Submission Guidelines
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf). Please submit your paper via

Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Accepted and presented papers will be included in the IEEE CPS Proceedings. Distinguished papers presented at the conference, after further revision, will be recommended to high quality international journals.

Important Dates
Submission Deadline: February 28, 2019
Authors Notification: April 27, 2019
Camera-Ready Manuscript Due: May 27, 2019

General Chairs
Ryan Ko, University of Queensland, New Zealand
Liqun Chen, University of Surrey, United Kingdom
Liming Zhu, Data61, CSIRO, Australia

Related Resources

EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
EAI SecureComm 2022   18th EAI International Conference on Security and Privacy in Communication Networks
MobiWis 2022   The 18th International Conference on Mobile Web and Intelligent Information Systems
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
IJMPICT 2022   International Journal of Managing Public Sector Information and Communication Technologies
MoWiN 2022   11th International Conference on Mobile & Wireless Networks
ICoIV 2022 - Ei Compendex & Scopus 2022   2022 International Conference on Intelligent Vehicles (ICoIV 2022)
ICDIS 2022   The 4th International Conference on Data Intelligence and Security