活动简介

With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security and privacy are becoming more and more demanding. Therefore, there is a grand challenge that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. As a result, we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security and privacy at the same time. As useful and innovative technologies, trusted computing and communications are attracting researchers with more and more attention.

The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17) will be held in Sydney, Australia from 1st to 4th August, 2017. It follows the success of TrustCom-16 in Tianjin, China, TrustCom-15 in Helsinki, Finland, TrustCom-14 in Beijing, China, TrustCom-12 in Liverpool, United Kingdom, TrustCom-11 in Changsha, China, TrustCom-10 in Hong Kong SAR, China and so on. The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.

Accepted and presented papers will be included in the IEEE CPS Proceedings. Distinguished papers presented at the conference, after further revision, will be published in special issues of high quality international journals.

征稿信息

重要日期

2017-03-26
初稿截稿日期
2017-05-01
初稿录用日期
2017-06-01
终稿截稿日期

征稿范围

Trust Track

  • Trust semantics, metrics and models

  • Trusted computing platform

  • Trusted network computing

  • Trusted operating systems

  • Trusted software and applications

  • Trust in social networks

  • Trust in e-commerce and e-government

  • Trust in mobile and wireless communications

  • Risk and reputation management

  • Survivable computer systems/networks

  • Trust in 5G networks

  • Miscellaneous trust issues in  cyber Security

Security Track

  • Network and Cyber security

  • Computer security

  • Database security

  • Web applications security

  • Security policy, model and architecture

  • Security in social networks

  • Security in parallel and distributed systems

  • Security in mobile and wireless communications

  • Security in cloud/pervasive computing

  • Authentication, authorization and accounting

  • Security of 5G Networks

  • Miscellaneous security issues

Privacy Track

  • Privacy in Web-based applications and services

  • Privacy in database systems

  • Privacy in parallel and distributed systems

  • Privacy in cloud/pervasive computing

  • Privacy in mobile and wireless communications

  • Privacy in e-commerce and e-government

  • Privacy in network deployment and management

  • Privacy and trust

  • Privacy and security

  • Privacy and anonymity

  • Privacy preservation in 5G

  • Miscellaneous privacy issues

Forensics and Analytics Track

  • Anti-forensics

  • Biometrics

  • Cryptanalysis

  • Cyber Analytics

  • Big data forensics

  • CCTV forensics

  • Cloud forensics

  • Computational forensics

  • Cyber-physical system forensics

  • Datamining for forensics

  • Facial recognition 

  • Fingerprint forensics

  • Image forensics

  • Malware forensics

  • Mobile app forensics (e.g. Skype, WeChat and Facebook)

  • Mobile device forensics

  • Multimedia forensics

  • Network forensics

  • Steganography and steganalysis

  • System reverse engineering

  • Watermarking

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    08月01日

    2017

    08月04日

    2017

  • 03月26日 2017

    初稿截稿日期

  • 05月01日 2017

    初稿录用通知日期

  • 06月01日 2017

    终稿截稿日期

  • 08月04日 2017

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询