Future ICT technologies, such as the concepts of Ambient Intelligence, Cyber-physical Systems, and Internet of Things provide a vision of the Information Society in which: a) people and physical systems are surrounded with intelligent interactive interfaces and objects, and b) environments are capable of recognising and reacting to the presence of different individuals or events in a seamless, unobtrusive, and invisible manner. The success of future ICT technologies will depend on how secure these systems are and to what extent they protect the privacy of individuals and individuals trust them.
In 2007, Workshop in Information Security Theory and Practice (WISTP) was created as a forum for bringing together researchers and practitioners in related areas and to encourage interchange and cooperation between the research community and the industrial/consumer community. Based on the growing interest of the participants, since 2015 WISTP is a conference.
The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017) seeks original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues.
Topics of interest include, but are not limited to
Security and Privacy in Smart Devices
Biometrics, National ID cards
Embedded Systems Security and TPMs
Interplay of TPMs and Smart Cards
Mobile Codes Security
Mobile Devices Security
Mobile Malware
Mobile OSes Security Analysis
RFID Systems
Smart Card
Smart Devices Applications
Wireless Sensor Node
Security and Privacy in Networks
Ad Hoc Networks
Content Defined Networks
Delay-Tolerant Networks
Domestic Networks
GSM/GPRS/UMTS Systems
Peer-to-Peer Networks
Security Issues in Mobile and Ubiquitous Networks
Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks
Vehicular Networks
Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others
Security and Privacy in Architectures, Protocols, Policies, Systems and Applications
BYOD Contexts
Big Data Management
Cloud Systems
Critical Infrastructure (e.g. for Medical or Military Applications)
Crowdsourcing
Cyber-Physical Systems
Data and Computation Integrity
Digital Rights Management (DRM)
Distributed Systems
Grid Computing
Identity and Trust Management
Information Assurance
Information Filtering
Internet of Things
Intrusion Detection
Lightweight cryptography
Localization Systems (Tracking of People and Goods)
M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human)
Mobile Commerce
Multimedia Applications
Public Administration and Governmental Services
Privacy Enhancing Technologies
Secure self-organization and self-configuration
Security Models, Architecture and Protocol: for Identification and Authentication, Access Control, Data Protection
Security Policies (Human-Computer Interaction and Human Behavior Impact)
Security Measurements
Smart Cities
Social Networks
Systems Controlling Industrial Processes
09月28日
2017
09月29日
2017
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
留言