WISTP 2014 - 8th Workshop in Information Security Theory and Practice (WISTP 2014)
Date2014-06-23 - 2014-06-25
Deadline2014-03-07
VenueHeraklion, Greece
Keywords
Websitehttps://www.wistp.org
Topics/Call fo Papers
Future ICT technologies, such as the concepts of Ambient Intelligence, Cyber-physical Systems and Internet of Things provide a vision of the Information Society in which: a) people and physical systems are surrounded with intelligent interactive interfaces and objects, and b) environments are capable of recognising and reacting to the presence of different individuals or events in a seamless, unobtrusive and invisible manner. The success of future ICT technologies will depend on how secure these systems may be, to what extent they will protect the privacy of individuals and how individuals will come to trust them. WISTP 2014 aims to address security and privacy issues of smart devices, networks, architectures, protocols, policies, systems, and applications related to Internet of Things, along with evaluating their impact on business, individuals, and the society.
The workshop seeks original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy of Internet of Things, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues.
Topics of interest include, but are not limited to
Security and Privacy in Smart Devices
Biometrics, National ID cards
Embedded Systems Security and TPMs
Interplay of TPMs and Smart Cards
Mobile Codes Security
Mobile Devices Security
Mobile Malware
Mobile OSes Security Analysis
New Applications for Secure RFID Systems
RFID Systems
Smart Card
Smart Devices Applications
Wireless Sensor Node
Security and Privacy in Networks
Ad Hoc Networks
Delay-Tolerant Network
Domestic Network
GSM/GPRS/UMTS Systems
Peer-to-Peer Networks
Security Issues in Mobile and Ubiquitous Networks
Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks
Vehicular Network
Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others
Security and Privacy in Architectures, Protocols, Policies, Systems and Applications
BYOD Contexts
Cloud-enhanced Mobile Security
Critical Infrastructure (e.g. for Medical or Military Applications)
Cyber-Physical Systems
Digital Rights Management (DRM)
Distributed Systems and Grid Computing
Information Assurance and Trust Management
Intrusion Detection and Information Filtering
Lightweight cryptography
Localization Systems (Tracking of People and Goods)
M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human)
Mobile Commerce
Multimedia Applications
Public Administration and Governmental Services
Pervasive Systems
Privacy Enhancing Technologies
Secure self-organization and self-configuration
Security Models, Architecture and Protocol: for Identification and Authentication, Access Control, Data Protection
Security Policies (Human-Computer Interaction and Human Behavior Impact)
Security Measurements
Smart Cities
Systems Controlling Industrial Processes
The workshop seeks original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy of Internet of Things, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues.
Topics of interest include, but are not limited to
Security and Privacy in Smart Devices
Biometrics, National ID cards
Embedded Systems Security and TPMs
Interplay of TPMs and Smart Cards
Mobile Codes Security
Mobile Devices Security
Mobile Malware
Mobile OSes Security Analysis
New Applications for Secure RFID Systems
RFID Systems
Smart Card
Smart Devices Applications
Wireless Sensor Node
Security and Privacy in Networks
Ad Hoc Networks
Delay-Tolerant Network
Domestic Network
GSM/GPRS/UMTS Systems
Peer-to-Peer Networks
Security Issues in Mobile and Ubiquitous Networks
Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks
Vehicular Network
Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others
Security and Privacy in Architectures, Protocols, Policies, Systems and Applications
BYOD Contexts
Cloud-enhanced Mobile Security
Critical Infrastructure (e.g. for Medical or Military Applications)
Cyber-Physical Systems
Digital Rights Management (DRM)
Distributed Systems and Grid Computing
Information Assurance and Trust Management
Intrusion Detection and Information Filtering
Lightweight cryptography
Localization Systems (Tracking of People and Goods)
M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human)
Mobile Commerce
Multimedia Applications
Public Administration and Governmental Services
Pervasive Systems
Privacy Enhancing Technologies
Secure self-organization and self-configuration
Security Models, Architecture and Protocol: for Identification and Authentication, Access Control, Data Protection
Security Policies (Human-Computer Interaction and Human Behavior Impact)
Security Measurements
Smart Cities
Systems Controlling Industrial Processes
Other CFPs
- International Conference on Intellectual Capital, Knowledge Management and Organisational Learning
- 13th European Conference on e-Learning
- 2014 UN-Water Annual International Zaragoza Conference
- The First International Conference on Robotics & Emerging Allied Technologies in Engineering (iCREATE)
- 10th International Symposium on Bioinformatics Research and Applications (ISBRA 2014)
Last modified: 2013-11-18 23:31:36