征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The 12th WISTP International Conference on Information Security Theory and Practice (WISTP 2018) seeks original submissions from academia and

industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of

fielded systems, the application of security technology, the implementation of systems, and lessons learned. 

We encourage submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues.

组委会

General Chair

  • Olivier Markowitch, ULB, Belgium

Workshop/panel/tutorial Chairs

  • Raja Naeem Akram, Royal Holloway University of London, UK

Program Committee Chairs

  • Olivier Blazy, XLIM, University of Limoges, France

  • Chan Yeob Yeun, Khalifa University, UAE

Program Committee

  • To be decided

Organizing committee

  • Olivier Markowitch

  • To be completed

Steering committee

  • Angelos Bilas, FORTH-ICS & University of Crete, Greece

  • Ernesto Damiani, Universita` degli Studi di Milano, Italy

  • Gerhard Hancke, City University of Hong Kong, Hong Kong

  • Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK

  • Joachim Posegga, Institute of IT-Security and Security Law at the University of Passau, Germany

  • Jean-Jacques Quisquater, ICTEAM, Catholic University of Louvain, Belgium

  • Damien Sauveron, XLIM, University of Limoges, France

Scientific Support

  • IFIP WG 11.2 Pervasive Systems Security

征稿信息

重要日期

2018-10-01
初稿截稿日期

征稿范围

Topics of interest include, but are not limited to:

Security and Privacy in Smart Devices

  • Biometrics, National ID cards
  • Embedded Systems Security and TPMs
  • Interplay of TPMs and Smart Cards
  • Mobile Codes Security
  • Mobile Devices Security
  • Mobile Malware
  • Mobile OSes Security Analysis
  • RFID Systems
  • Smart Card
  • Smart Devices Applications
  • Wireless Sensor Node

Security and Privacy in Networks

  • Ad Hoc Networks
  • Content Defined Networks
  • Delay-Tolerant Network
  • Domestic Network
  • GSM/GPRS/UMTS Systems
  • Mobile Networks
  • Peer-to-Peer Networks
  • Pervasive and Ubiquitous Systems
  • Sensor Networks:  Campus Area, Body Area, Sensor and Metropolitan Area Networks
  • Vehicular Network
  • Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others

Security and Privacy in Architectures, Protocols, Policies, Systems and Applications

  • BYOD Contexts
  • Big Data Management
  • Cloud Systems
  • Critical Infrastructure (e.g. for Medical or Military Applications)
  • Crowdsourcing
  • Cyber-Physical Systems
  • Data and Computation Integrity
  • Digital Rights Management (DRM)
  • Distributed Systems
  • Grid Computing
  • Identity and Trust Management
  • Information Assurance
  • Information Filtering
  • Internet of Things
  • Intrusion Detection
  • Lightweight cryptography
  • Location Services (Tracking of People and Goods)
  • M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human)
  • Mobile Commerce
  • Multimedia Applications
  • Public Administration and Governmental Services
  • Privacy Enhancing Technologies
  • Secure self-organization and self-configuration
  • Security Models, Architecture, and Protocol for Identification and Authentication, Access Control, Data Protection
  • Security Policies (Human-Computer Interaction and Human Behavior Impact)
  • Security Measurements
  • Smart Cities
  • Social Networks
  • Systems Controlling Industrial Processes

作者指南

Submissions must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most 16 pages in total in the Springer's LNCS format. 

All submissions should be anonymous (i.e., no author names/affiliations and obvious citations). 

Submissions are to be made to the submission web site: https://www.easychair.org/conferences/?conf=wistp2018

 

Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. 

Accepted papers will be published by Springer in the Lecture Notes in Computer Science series, and the proceedings will be available

at the conference. The camera-ready version of the accepted papers must follow Springer guidelines (a Latex source file will be required).

 

If a submitted paper is mainly the work of a student author, this paper is eligible for the best student paper award. To participate

in this selection process, please add the word "STUDENT" in the affiliation field in the submission form.

 

Authors of accepted papers must guarantee that their papers will be presented at the conference. At least one author of each accepted paper

is required to register with the conference and present the paper.  For authors presenting multiple papers, one normal registration is valid for up to two papers.

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    12月10日

    2018

    12月11日

    2018

  • 10月01日 2018

    初稿截稿日期

  • 12月11日 2018

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询