*****************
CALL FOR PAPERS
*****************
FOURTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2010):
Security and Privacy of Pervasive Systems and Smart Devices
April 13-14, Passau, Germany - http://www.wistp.org/
WISTP 2010 BACKGROUND AND GOALS
The impact of pervasive and smart devices on our daily lives is ever
increasing, and the rapid technological development of information
technologies ensures that this impact is constantly changing. It is
imperative that these complex and resource constrained technologies
are not vulnerable to attack. This workshop will consider the full
impact of the use of pervasive and smart technologies on individuals,
and society at large, with regard to the security and privacy of the
systems that make use of them.
The workshop seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of security
and privacy of pervasive systems and smart devices, as well as
experimental studies of fielded systems.
We encourage submissions that address the application of security
technology, the implementation of systems, and lessons learned. We
encourage submissions from other communities such as law and business
that present these communities' perspectives on technological issues.
Topics of interest include, but are not limited to:
* Access control
* Ad hoc networks security
* Anonymity
* Biometrics, national ID cards
* Data and application security and privacy
* Data protection
* Delay-tolerant network security
* Digital rights management (DRM) in pervasive environments
* Domestic network security
* Embedded systems security and TPMs
* Human and psychological aspects of security
* Human-computer interaction and human behavior impact for security
* Identity management
* Information assurance and trust management
* Interplay of TPMs and smart cards
* Intrusion detection and information filtering
* Mobile codes security
* Mobile commerce security
* Mobile devices security
* New applications for secure RFID systems
* Peer-to-peer security
* Privacy enhancing technologies
* RFID and NFC systems security
* Secure self-organization and self-configuration
* Security in location services
* Security issues in mobile and ubiquitous networks
* Security metrics
* Security models and architecture
* Security of GSM/GPRS/UMTS systems
* Security policies
* Security protocols
* Sensor networks security
* Smart card security
* Smart devices applications
* Vehicular network security
* Wireless communication security
* Wireless sensor node security
IMPORTANT DATES
Paper submission due: November 20, 2009 (midnight Samoa time)
Notification to authors: January 17, 2010
Author registration: February 1, 2010
Camera-ready due: February 1, 2010
SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal, a
conference, or a workshop with proceedings. Papers should be at most
15 pages including the bibliography and well-marked appendices (using
11-point font and reasonable margins), and should be in single-column
format. Committee members are not required to read the appendices,
and so the paper should be intelligible without them. All submissions
should be appropriately anonymized (i.e., papers should not contain
author names or affiliations, or obvious citations). Submissions are
to be made to the submission web site
(http://www.wistp.org/submission-details/). Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of November 20, 2009. Accepted papers will be published by
Springer in the Lecture Notes in Computer Science series. The
camera-ready version of the accepted papers must follow Springer
guidelines (a Latex source file will be required).
If a submitted paper is mainly the result of the work of a student
author, this paper could have the chance to be selected as "Best
student paper" (even if the paper has been written with senior
co-authors). To participate to this selection process, please add the
word "STUDENT" in the affiliation field in the submission form.
Authors of accepted papers must guarantee that their papers will be
presented at the workshop. At least one author of each accepted paper
is required to register with the workshop and present the paper. For
authors presenting multiple papers, one normal registration is valid
for up to two papers.
WISTP 2010 COMMITTEES AND CHAIRS
General Chairs
* Joachim Posegga, University of Passau, Germany
* Konstantinos Markantonakis, Royal Holloway University of
London, UK
Program Chairs
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Michael Tunstall, University of Bristol, UK
Workshop/Panel/Tutorial Chair
* Damien Sauveron, University of Limoges, France
Publicity Chairs
* Claudio A. Ardagna, Universita' degli Studi di Milano, Italy
* Ioannis G. Askoxylakis, FORTH-ICS, Greece
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
Local Organization
* Joachim Posegga, University of Passau, Germany
Program Committee
* TBA
WISTP Steering Committee
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, the Netherlands
* Konstantinos Markantonakis, Royal Holloway University of
London, UK
* Chris Mitchell, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, Catholic University of Louvain,
Belgium
* Damien Sauveron, University of Limoges, France
SPONSOR
* IFIP WG 11.2 Pervasive Systems Security
For further inquiries, please contact Damien Sauveron at
damien.sauveron@unilim.fr <mailto:damien.sauveron@unilim.fr>
--
Damien Sauveron
http://damien.sauveron.fr/
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment