[PET] Call for Papers - The 9th WISTP International Conference on Information Security Theory and Practice (WISTP'2015)

Ruggero Donida Labati ruggero.donida at unimi.it
Fri Feb 20 22:01:34 GMT 2015


.:: Call for Papers ::.
=======================

************************************************************************************************
The 9th WISTP International Conference on Information Security Theory 
and Practice (WISTP'2015)
August 24-25, 2015, Crete, Greece - www.wistp.org
************************************************************************************************

BACKGROUND AND GOALS
--------------------------
Future ICT technologies, such as the concepts of Ambient Intelligence, 
Cyber-physical
  Systems, and Internet of Things provide a vision of the Information 
Society in which: a)
people and physical systems are surrounded with intelligent interactive 
interfaces and
objects, and b) environments are capable of recognising and reacting to 
the presence of
different individuals or events in a seamless, unobtrusive, and 
invisible manner.  The success
of future ICT technologies will depend on how secure these systems are 
and to what extent
they protect the privacy of individuals and individuals trust them.
In 2007, Workshop in Information Security Theory and Practice (WISTP) 
was created as a
forum for bringing together researchers and practitioners in related 
areas and to encourage
interchange and cooperation between the research community and the 
industrial/consumer
community. Based on the growing interest of the participants, 2015 
edition is becoming a
conference – The 9th WISTP International Conference on Information 
Security Theory and
Practice (WISTP'2015).
WISTP 2015 seeks original submissions from academia and industry 
presenting novel
research on all theoretical and practical aspects of security and 
privacy, as well as
experimental studies of fielded systems, the application of security 
technology, the
implementation of systems, and lessons learned. We encourage submissions 
from other
communities such as law, business, and policy that present these 
communities' perspectives
on technological issues. Topics of interest include, but are not limited to:
* Security and Privacy in Smart Devices
- Biometrics, National ID cards
- Embedded Systems Security and TPMs
- Interplay of TPMs and Smart Cards
- Mobile Codes Security
- Mobile Devices Security
- Mobile Malware
- Mobile OSes Security Analysis
- New Applications for Secure RFID Systems
- RFID Systems
- Smart Card
- Smart Devices Applications
- Wireless Sensor Node

  * Security and Privacy in Networks
- Ad Hoc Networks
- Delay-Tolerant Network
- Domestic Network
- GSM/GPRS/UMTS Systems
- Peer-to-Peer Networks
- Security Issues in Mobile and Ubiquitous Networks
- Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area 
Networks
- Vehicular Network
- Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others

  * Security and Privacy in Architectures, Protocols, Policies, Systems 
and Applications
- BYOD Contexts
- Cloud-enhanced Mobile Security
- Critical Infrastructure (e.g. for Medical or Military Applications)
- Cyber-Physical Systems
- Digital Rights Management (DRM)
- Distributed Systems and Grid Computing
- Information Assurance and Trust Management
- Intrusion Detection and Information Filtering
- Lightweight cryptography
- Localization Systems (Tracking of People and Goods)
- M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to 
Human)
- Mobile Commerce
- Multimedia Applications
- Public Administration and Governmental Services
- Pervasive Systems
- Privacy Enhancing Technologies
- Secure self-organization and self-configuration
- Security Models, Architecture and Protocol: for Identification and 
Authentication, Access
Control, Data Protection
- Security Policies (Human-Computer Interaction and Human Behavior Impact)
- Security Measurements
- Smart Cities
- Systems Controlling Industrial Processes

IMPORTANT DATES
--------------------------
Paper Submission due: April 10, 2015
Notification to authors: May 30, 2015
Camera ready due: June 10, 2015

  SUBMISSION INSTRUCTIONS
--------------------------
Submissions must not substantially overlap with papers that have been 
published or that
are simultaneously submitted to a journal or conference/workshop with 
proceedings. Each
submission should be at most 16 pages in total in the Springer’s LNCS 
format
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). All 
submissions
should be anonymous (i.e., no author names/affiliations and obvious 
citations). Submissions
are to be made to the submission web site 
(http://www.wistp.org/submission-details/).
Only PDF files will be accepted. Submissions not meeting these 
guidelines risk rejection
without consideration of their merits. Accepted papers will be published 
by Springer in the
Lecture Notes in Computer Science series 
(http://www.springeronline.com/lncs), and the
proceedings will be available at the workshop. The camera-ready version 
of the accepted
papers must follow Springer guidelines (a Latex source file will be 
required).
If a submitted paper is mainly the work of a student author, this paper 
is eligible for the best
student paper award. To participate in this selection process, please 
add the word
"STUDENT" in the affiliation field in the submission form.
Authors of accepted papers must guarantee that their papers will be 
presented at the
workshop. At least one author of each accepted paper is required to 
register with the
workshop and present the paper. For authors presenting multiple papers, 
one normal
registration is valid for up to two papers.
Selected papers will be invited to submit an extended version of their 
papers to the
following Journal Special Issues:
-    Computer Networks, Special Issue on Recent Advances in 
Physical-Layer Security
-    IET Information Security, Special Issue on Lightweight and 
Energy-Efficient Security
Solutions for Mobile Computing Devices
-    Future Generation Computer Systems, Special Issue on Security, 
Privacy and Trust of
the User-Centric Solutions

WISTP 2015 COMMITTEES AND CHAIRS
--------------------------
General Chair
* Ioannis Askoxylakis, FORTH-ICS, Greece

Local Organizers
* Nikolaos Petroulakis,  FORTH-ICS, Greece

Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France

Publicity Chairs
* Ruggero Donida Labati, Universita' degli Studi di Milano, Italy

  Program Chairs
* Sushil Jajodia, George Mason University Fairfax, USA
* Raja Naeem Akram, Royal Holloway, University of London, UK
Program Committee
* TBA

WISTP Steering Committee
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Lorenzo Cavallaro, Royal Holloway, University of London, UK
* Dieter Gollmann, Hamburg University of Technology, Germany
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of 
London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France

SPONSOR
--------------------------
* Co-Sponsored by IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Raja Naeem Akram at 
r.n.akram at rhul.ac.uk
This call for papers and additional information about the conference can 
be found at
www.wistp.org
Program chairs can be contacted at wistp2015 at easychair.org

---
Questa e-mail è stata controllata per individuare virus con Avast antivirus.
http://www.avast.com



More information about the PET mailing list