ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CARDIS 2016 - 15th Smart Card Research and Advanced Application Conference

Date2016-11-07 - 2016-11-09

Deadline2016-07-15

VenueCannes, France France

Keywords

Websitehttps://cardis.org/cardis2016

Topics/Call fo Papers

CARDIS has provided a forum for presenting exceptional research on smart cards and related technologies since 1994. Smart cards play an important role in our day-to-day lives, from bank cards to GSM SIMs, and security is vital to keep these systems functioning correctly. The CARDIS conferences gather researchers and technologists who focus on all aspects of the design, development, deployment, evaluation and application of smart cards and secure elements in secure platforms or systems. The technology used in smart cards, and hence the attack vectors, are expanding in to other areas, such as TPMs, HSMs, mobile phones and the Internet of Things. It is more important than ever that we understand how smart cards, and related systems, can be secured.
The fifteenth Smart Card Research and Advanced Application Conference is organized by Eurecom and will be held in Cannes on the French Riviera on November 7-9, 2016.
Topics
The program committee is seeking original papers on all aspects of the security of smart cards and embedded systems. Submissions across a broad range of the development phases are encouraged, from exploratory research and proof-of-concept studies to practical applications and deployment of smart cards and related technologies. Topics of interest include, but are not limited to:
Hardware architectures for secure embedded systems
Physical attacks and countermeasures
Efficient cryptographic implementations for smart cards and embedded systems
True random number generators
Smart cards and their applications
Security of mobile devices and their applications
Security of RFID/NFC systems and sensor nodes
Security for access control, identification, mobile payment, transportation tokens.
Security for the Internet of Things
Identity, privacy and trust issues
Trusted computing (mobile TPMs, TrustZone, Trusted Execution Environments, ...)
Software for secure embedded systems (operating systems, virtual machines, ...)
Anti-cloning and anti-counterfeiting technologies
Hardware trojans implementation and detection
Reverse engineering of secure embedded systems
Evaluation and certification of secure embedded systems

Last modified: 2016-05-10 22:55:09