AuthTech 2016 - 1st International Workshop on Authentication Techniques (AuthTech 2016)
Date2016-05-30 - 2016-06-03
Deadline2016-02-12
VenueXi'an, China
Keywords
Websitehttps://info.dacas.cn/at2015
Topics/Call fo Papers
Authentication is the first line of defense in computing systems. In recent years, authentication techniques evolve rapidly from password based authentication to biometrics and public key based authentication in various applications including smart phones, sensor networks, RFID systems, internet of things, healthcare, smart grids, financial and banking systems, mobile payments, and cloud computing. This workshop will provide a forum for professionals from academia, governments and industry to share their opinions on the challenges and solutions in developing highly secure and usable authentication techniques in practical settings.
Topics
Research contributions are solicited in all areas related to authentication, including but not limited to:
Password based authentication systems
Leakage resilient password systems
Graphical passwords
Password managers
2FA and multiple factor authentication
Biometrics based authentication (fingerprint, face, voice…)
Context based authentication (location, time…)
Lightweight authentication in RFID/NFC/sensor network systems
Authentication in applications (healthcare, smarthome, smart grids, internet of things, financial and banking systems, mobile payments, cloud computing…)
Authentication on mobile platforms
Authentication on wearable devices
Usability of authentication systems
Continuous authentication
Single sign on
Fast ID Online (FIDO) techniques
Topics
Research contributions are solicited in all areas related to authentication, including but not limited to:
Password based authentication systems
Leakage resilient password systems
Graphical passwords
Password managers
2FA and multiple factor authentication
Biometrics based authentication (fingerprint, face, voice…)
Context based authentication (location, time…)
Lightweight authentication in RFID/NFC/sensor network systems
Authentication in applications (healthcare, smarthome, smart grids, internet of things, financial and banking systems, mobile payments, cloud computing…)
Authentication on mobile platforms
Authentication on wearable devices
Usability of authentication systems
Continuous authentication
Single sign on
Fast ID Online (FIDO) techniques
Other CFPs
- Fourth International Workshop on Security in Cloud Computing (SCC)
- 2nd International Workshop on IoT Privacy, Trust, and Security (IoTPTS 2016)
- Victorians Like Us III International Conference:‘Progress. A blessing or a curse?’
- 2016 3rd NAFOSTED Conference on Information and Computer Science
- 9th Transformation Tool Contest
Last modified: 2016-01-17 22:50:47