Trust 2016 - 9th International Conference on Trust & Trustworthy Computing
Topics/Call fo Papers
TRUST 2016 is an international conference that explores new ideas and experiences in building, designing, using and understanding trustworthy computing systems.
Paper topics include, but are not limited to:
- Architectures for trustworthy infrastructures
- Emerging applications and technologies, including recent industrial research and development on trusted/trustworthy computing
- Hardware security, including secure storage, cryptographic coprocessors, smartcards, and physically unclonable functions (PUFs)
- Trustworthy applications, including webbased systems
- Trusted mobile computing platforms
- Trustworthy embedded, CyberPhysical, and Internet of Things systems
- Security analysis and formal techniques for trusted/trustworthy computing
- Verification of trusted/trustworthy computing (architectures, platforms, software, protocols)
- Usability of trusted/trustworthy computing solutions and humancomputer interactions
- Cloud security and trustworthy services
- Trust management
- Software engineering techniques for trustworthiness
- Operating system security, including virtualization and monitoring
- Cryptography for trusted computing and related applications
- Intrusion detection and resilience leveraging trusted computing
- Security policies and management of trusted/trustworthy systems
- Experimental, userbased or testbed studies
Paper topics include, but are not limited to:
- Architectures for trustworthy infrastructures
- Emerging applications and technologies, including recent industrial research and development on trusted/trustworthy computing
- Hardware security, including secure storage, cryptographic coprocessors, smartcards, and physically unclonable functions (PUFs)
- Trustworthy applications, including webbased systems
- Trusted mobile computing platforms
- Trustworthy embedded, CyberPhysical, and Internet of Things systems
- Security analysis and formal techniques for trusted/trustworthy computing
- Verification of trusted/trustworthy computing (architectures, platforms, software, protocols)
- Usability of trusted/trustworthy computing solutions and humancomputer interactions
- Cloud security and trustworthy services
- Trust management
- Software engineering techniques for trustworthiness
- Operating system security, including virtualization and monitoring
- Cryptography for trusted computing and related applications
- Intrusion detection and resilience leveraging trusted computing
- Security policies and management of trusted/trustworthy systems
- Experimental, userbased or testbed studies
Other CFPs
- 13th International Conference on Latent Variable Analysis and Signal Separation ? LVA/ICA 2017
- 6th Community-Based Signal Separation Evaluation Campaign (SiSEC 2017)
- 3rd International Conference on Language and Literacy Education
- International Workshop on Mobile-Human Interaction and Applications
- International Workshop on E-LEARNing and Educational Software
Last modified: 2016-03-11 03:26:08