[Om-announce] [WISTP2018]: 12th WISTP International Conference on Information Security Theory and Practice - Deadline extended to October 14, 2018 [FIRM DEADLINE]

Damien Sauveron damien.sauveron at unilim.fr
Wed Oct 10 10:27:01 CEST 2018


Please accept our apologies if you receive multiple copies of this CFP

/Due to several requests, the deadline is extended to October 14, 2018 
(11:59 p.m. American Samoa time) [FIRM DEADLINE]/

//

[online version <http://www.wistp.org/call-for-papers/>]

.:: Call for Papers ::.

=======================

*12th WISTP International Conference on Information Security Theory and 
Practice (WISTP 2018)
Brussels, Belgium -- 10-11 December 2018

http://www.wistp.org/

*

*/Deadline for submissions: //14 October 2018 [FIRM DEADLINE]
/*

Future ICT technologies, such as the concepts of Ambient Intelligence, 
Cyber-physical Systems, and Internet of Things provide a vision of the 
Information Society in which: a) people and physical systems are 
surrounded with intelligent interactive interfaces and objects, and b) 
environments are capable of recognising and reacting to the presence of 
different individuals or events in a seamless, unobtrusive, and 
invisible manner. The success of future ICT technologies will depend on 
how secure these systems are and to what extent they protect the privacy 
of individuals and individuals trust them.


The 12th WISTP International Conference on Information Security Theory 
and Practice (WISTP'2018) seeks original submissions from academia and 
industry presenting novel research on all theoretical and practical 
aspects of security and privacy, as well as experimental studies of 
fielded systems, the application of security technology, the 
implementation of systems, and lessons learned. We encourage submissions 
from other communities such as law, business, and policy that present 
these communities' perspectives


/Topics of Interest:/

  * *Security and Privacy in Smart Devices*
      o Biometrics, National ID cards
      o Embedded Systems Security and TPMs
      o Interplay of TPMs and Smart Cards
      o Mobile Codes Security
      o Mobile Devices Security
      o Mobile Malware
      o Mobile OSes Security Analysis
      o RFID Systems
      o Smart Card
      o Smart Devices Applications
      o Wireless Sensor Node


  * *Security and Privacy in Networks*
      o Ad Hoc Networks
      o Content Defined Networks
      o Delay-Tolerant Networks
      o Domestic Networks
      o GSM/GPRS/UMTS Systems
      o Peer-to-Peer Networks
      o Security Issues in Mobile and Ubiquitous Networks
      o Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan
        Area Networks
      o Vehicular Networks
      o Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others


  * *Security and Privacy in Architectures, Protocols, Policies, Systems
    and Applications*
      o BYOD Contexts
      o Big Data Management
      o Cloud Systems
      o Critical Infrastructure (e.g. for Medical or Military Applications)
      o Crowdsourcing
      o Cyber-Physical Systems
      o Data and Computation Integrity
      o Digital Rights Management (DRM)
      o Distributed Systems
      o Grid Computing
      o Identity and Trust Management
      o Information Assurance
      o Information Filtering
      o Internet of Things
      o Intrusion Detection
      o Lightweight cryptography
      o Localization Systems (Tracking of People and Goods)
      o M2M (Machine to Machine), H2M (Human to Machine) and M2H
        (Machine to Human)
      o Mobile Commerce
      o Multimedia Applications
      o Public Administration and Governmental Services
      o Privacy Enhancing Technologies
      o Secure self-organization and self-configuration
      o Security Models, Architecture and Protocol: for Identification
        and Authentication, Access Control, Data Protection
      o Security Policies (Human-Computer Interaction and Human Behavior
        Impact)
      o Security Measurements
      o Smart Cities
      o Social Networks
      o Systems Controlling Industrial Processes


*/Submission Instructions/*

/Submissions must not substantially overlap papers that have been 
published or that are simultaneously submitted to a journal or 
conference/workshop with proceedings. Each submission should be at most 
16 pages in total in the Springer’s LNCS format. All submissions should 
be anonymous (i.e., no author names/affiliations and obvious citations).
Submissions are to be made to the submission web 
site:https://easychair.org/conferences/?conf=wistp2018

Only PDF files will be accepted. Submissions not meeting these 
guidelines risk rejection without consideration of their merits. 
Accepted papers will be published by Springer in the Lecture Notes in 
Computer Science series, and the proceedings will be available at the 
conference. The camera-ready version of the accepted papers must follow 
Springer guidelines (a Latex source file will be required).

If a submitted paper is mainly the work of a student author, this paper 
is eligible for the best student paper award. To participate in this 
selection process, please add the word "STUDENT" in the affiliation 
field in the submission form.

Authors of accepted papers must guarantee that their papers will be 
presented at the conference. At least one author of each accepted paper 
is required to register with the conference and present the paper. For 
authors presenting multiple papers, one normal registration is valid for 
up to two papers.
/
/*Scientific supports*/
- IFIP WG 11.2 Pervasive Systems Security <https://www.ifiptc11.org/wg112>

-- 
Damien Sauveron
http://damien.sauveron.fr/

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.openmath.org/pipermail/om-announce/attachments/20181010/967fb7a0/attachment-0001.html>


More information about the Om-announce mailing list