[PET] Deadline extended - 11th WISTP International Conference on Information Security Theory and Practice (WISTP 2017)

Ruggero Donida Labati ruggero.donida at unimi.it
Thu Jun 15 18:36:27 BST 2017


** Deadline extended: June 29, 2017 **


.:: Call for Papers ::.

*************************************************************************************
The 11th WISTP International Conference on Information Security Theory 
and Practice (WISTP'2017)
September 28-29, 2017, Crete, Greece - www.wistp.org
*************************************************************************************

IMPORTANT DATES
--------------------------
Paper Submission due: June 29, 2017 [FIRM DEADLINE]
Notification to authors: July 31, 2017
Camera ready due: August 15, 2017

The 11th WISTP International Conference on Information Security Theory 
and Practice (WISTP'2017) seeks original
submissions from academia and industry presenting novel research on all 
theoretical and practical aspects of security
and privacy, as well as experimental studies of fielded systems, the 
application of security technology, the
implementation of systems, and lessons learned. We encourage submissions 
from other communities such as law, business,
and policy that present these communities' perspectives on technological 
issues.

In 2007, Workshop in Information Security Theory and Practice (WISTP) 
was created as a forum for bringing together
researchers and practitioners in related areas and to encourage 
interchange and cooperation between the research
community and the industrial/consumer community. From 2015, due to 
increased participation it has become a Conference.

Submissions with regards to the security of future ICT technologies, 
such as cyber-physical systems, cloud services,
data science and the Internet of Things are particularly welcome.

Other topics of interest include, but are not limited to:

* Security and Privacy in Smart Devices
- Biometrics, National ID cards
- Embedded Systems Security and TPMs
- Interplay of TPMs and Smart Cards
- Mobile Codes Security
- Mobile Devices Security
- Mobile Malware
- Mobile OSes Security Analysis
- New Applications for Secure RFID Systems
- RFID Systems
- Smart Card
- Smart Devices Applications
- Wireless Sensor Node

   * Security and Privacy in Networks
- Ad Hoc Networks
- Delay-Tolerant Network
- Domestic Network
- GSM/GPRS/UMTS Systems
- Peer-to-Peer Networks
- Security Issues in Mobile and Ubiquitous Networks
- Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area 
Networks
- Vehicular Network
- Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others

   * Security and Privacy in Architectures, Protocols, Policies, Systems 
and Applications
- BYOD Contexts
- Cloud-enhanced Mobile Security
- Critical Infrastructure (e.g. for Medical or Military Applications)
- Cyber-Physical Systems
- Digital Rights Management (DRM)
- Distributed Systems and Grid Computing
- Information Assurance and Trust Management
- Intrusion Detection and Information Filtering
- Lightweight cryptography
- Localization Systems (Tracking of People and Goods)
- M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to
Human)
- Mobile Commerce
- Multimedia Applications
- Public Administration and Governmental Services
- Pervasive Systems
- Privacy Enhancing Technologies
- Secure self-organization and self-configuration
- Security Models, Architecture and Protocol: for Identification and 
Authentication, Access Control, Data Protection
- Security Policies (Human-Computer Interaction and Human Behavior Impact)
- Security Measurements
- Smart Cities
- Systems Controlling Industrial Processes

  SUBMISSION INSTRUCTIONS
--------------------------
Submissions must not substantially overlap with papers that have been 
published or that are simultaneously submitted to a
journal or conference/workshop with proceedings. Each submission should 
be at most 16 pages in total in the Springer LNCS
format.

For detailed instructions please see the website.




More information about the PET mailing list