[Om-announce] One day before the firm deadline - The 9th WISTP International Conference on Information Security Theory and Practice (WISTP'2015)
Ruggero Donida Labati
ruggero.donida at unimi.it
Wed Apr 29 11:09:25 CEST 2015
.:: Call for Papers ::.
One day before the firm deadline (April 30, 2015)!
************************************************************************************************
The 9th WISTP International Conference on Information Security Theory
and Practice (WISTP'2015)
August 24-25, 2015, Crete, Greece - www.wistp.org
************************************************************************************************
BACKGROUND AND GOALS
Future ICT technologies, such as the concepts of Ambient Intelligence,
Cyber-physical Systems,
and Internet of Things provide a vision of the Information Society in
which: a) people and
physical systems are surrounded with intelligent interactive interfaces
and objects, and b)
environments are capable of recognising and reacting to the presence of
different individuals
or events in a seamless, unobtrusive, and invisible manner. The success
of future ICT
technologies will depend on how secure these systems are and to what
extent they protect the
privacy of individuals and individuals trust them.
In 2007, Workshop in Information Security Theory and Practice (WISTP)
was created as a forum for
bringing together researchers and practitioners in related areas and to
encourage interchange
and cooperation between the research community and the
industrial/consumer community. Based on
the growing interest of the participants, 2015 edition is becoming a
conference – The 9th WISTP
International Conference on Information Security Theory and Practice
(WISTP'2015).
WISTP 2015 seeks original submissions from academia and industry
presenting novel research on
all theoretical and practical aspects of security and privacy, as well
as experimental studies
of fielded systems, the application of security technology, the
implementation of systems, and
lessons learned. We encourage submissions from other communities such as
law, business, and
policy that present these communities' perspectives on technological
issues. Topics of interest
include, but are not limited to:
* Security and Privacy in Smart Devices
- Biometrics, National ID cards
- Embedded Systems Security and TPMs
- Interplay of TPMs and Smart Cards
- Mobile Codes Security
- Mobile Devices Security
- Mobile Malware
- Mobile OSes Security Analysis
- New Applications for Secure RFID Systems
- RFID Systems
- Smart Card
- Smart Devices Applications
- Wireless Sensor Node
* Security and Privacy in Networks
- Ad Hoc Networks
- Delay-Tolerant Network
- Domestic Network
- GSM/GPRS/UMTS Systems
- Peer-to-Peer Networks
- Security Issues in Mobile and Ubiquitous Networks
- Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area
Networks
- Vehicular Network
- Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others
* Security and Privacy in Architectures, Protocols, Policies, Systems
and Applications
- BYOD Contexts
- Cloud-enhanced Mobile Security
- Critical Infrastructure (e.g. for Medical or Military Applications)
- Cyber-Physical Systems
- Digital Rights Management (DRM)
- Distributed Systems and Grid Computing
- Information Assurance and Trust Management
- Intrusion Detection and Information Filtering
- Lightweight cryptography
- Localization Systems (Tracking of People and Goods)
- M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to
Human)
- Mobile Commerce
- Multimedia Applications
- Public Administration and Governmental Services
- Pervasive Systems
- Privacy Enhancing Technologies
- Secure self-organization and self-configuration
- Security Models, Architecture and Protocol: for Identification and
Authentication, Access
Control, Data Protection
- Security Policies (Human-Computer Interaction and Human Behavior Impact)
- Security Measurements
- Smart Cities
- Systems Controlling Industrial Processes
IMPORTANT DATES
Paper Submission due: April 30, 2015 [Extended Firm Deadline]
Notification to authors: May 30, 2015
Camera ready due: June 10, 2015
SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap with papers that have been
published or that are
simultaneously submitted to a journal or conference/workshop with
proceedings. Each submission
should be at most 16 pages in total in the Springer’s LNCS format
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). All
submissions should be
anonymous (i.e., no author names/affiliations and obvious citations).
Submissions are to be made
to the submission web site (http://www.wistp.org/submission-details/).
Only PDF files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their
merits. Accepted papers will be published by Springer in the Lecture
Notes in Computer Science
series (http://www.springeronline.com/lncs), and the proceedings will be
available at the
workshop. The camera-ready version of the accepted papers must follow
Springer guidelines (a
Latex source file will be required).
If a submitted paper is mainly the work of a student author, this paper
is eligible for the best
student paper award. To participate in this selection process, please
add the word "STUDENT" in
the affiliation field in the submission form.
Authors of accepted papers must guarantee that their papers will be
presented at the workshop.
At least one author of each accepted paper is required to register with
the workshop and present
the paper. For authors presenting multiple papers, one normal
registration is valid for up to
two papers.
Selected papers will be invited to submit an extended version of their
papers to the following
Journal Special Issues:
- Computer Networks, Special Issue on Recent Advances in Physical-Layer
Security
- IET Information Security, Special Issue on Lightweight and
Energy-Efficient Security
Solutions for Mobile Computing Devices
- Future Generation Computer Systems, Special Issue on Security, Privacy
and Trust of the
User-Centric Solutions
WISTP 2015 COMMITTEES AND CHAIRS
General Chair
* Ioannis Askoxylakis, FORTH-ICS, Greece
Local Organizers
* Nikolaos Petroulakis, FORTH-ICS, Greece
Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France
Publicity Chairs
* Ruggero Donida Labati, Universita' degli Studi di Milano, Italy
Program Chairs
* Sushil Jajodia, George Mason University Fairfax, USA
* Raja Naeem Akram, Royal Holloway, University of London, UK
Program Committee
* Mohamed Ahmed Abdelraheem, The Technical University of Denmark/DTU
Compute, Denmark
* Claudio A. Ardagna, Universita` degli Studi di Milano, Italy
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Selcuk Baktir, Bahcesehir University, Turkey
* Lejla Batina, Radboud University Nijmegen, The Netherlands
* Samia Bouzefrane, CEDRIC, Conservatoire National des Arts et Métier,
France
* Lorenzo Cavallaro, Royal Holloway, University of London, UK
* Hervé Chabanne, Morpho, France
* Serge Chaumette, LaBRI, University of Bordeaux, France
* Delphine Christin, University of Bonn, Fraunhofer FKIE, Germany
* Mauro Conti, University of Padua, Italy
* Kurt Dietrich, NXP, Austria
* Sara Foresti, Universita` degli Studi di Milano, Italy
* José María de Fuentes, Carlos III University of Madrid, Spain
* Flavio Garcia, University of Birmingham, UK
* Yong Guan, Iowa State University, USA
* Gerhard Hancke, City University of Hong Kong, Hong Kong
* Julio Hernandez-Castro, University of Kent, UK
* Michael Hutter, Institute for Applied Information Processing and
Communications (IAIK), Graz
University of Technology, Austria
* Süleyman Kardas, TÜBITAK-BILGEM, Turkey
* Mehmet Sabir Kiraz, TÜBITAK-BILGEM, Turkey
* Andrea Lanzi, University of Milan, Italy
* Maryline Laurent, SAMOVAR UMR CNRS 5157, Telecom SudParis, France
* Albert Levi, Sabanci University, Turkey
* Peng Liu, Pennsylvania State University, USA
* Javier Lopez, Computer Science Department, University of Malaga, Spain
* Federico Maggi, Politecnico di Milano, Italy
* Vashek Matyas, Masaryk University, Czech Republic
* Sjouke Mauw, University of Luxembourg, Luxembourg
* Nele Mentes, KU Leuven, Belgium
* Alessio Merlo, University of Genova, Italy
* Vladimir A Oleshchuk, University of Agder, Norway
* Jonathan P. Chapman, University of Bonn, Germany
* Milan Petkovic, Eindhoven University of Technology, The Netherlands
* Wolter Pieters, TU Delft and University of Twente, The Netherlands
* Henrich C. Pöhls, Institute of IT Security and Security Law at the
University of Passau,
Germany
* Christina Pöpper, Ruhr-University Bochum, Germany
* Joachim Posegga, Institute of IT-Security and Security Law, Germany
* Kai Rannenberg, Goethe University Frankfurt, Deutsche Telekom Chair of
Mobile Business &
Multilateral Security, Germany
* Kui Ren, State University of New York at Buffalo, USA
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita` degli Studi di Milano, Italy
* Siraj Ahmed Shaikh, Coventry University, UK
* Dave Singelée, KU Leuven - iMinds - COSIC, Belgium
* Willy Susilo, University of Wollongong, Australia
* Ulrich Tamm, Germany
* Li Tieyan, Huawei Technologies, Singapore
* Denis Trcek, University of Ljubljana, Slovenia
* Michael Tunstall, Cryptography Research Inc, USA
* Umut Uludag, TÜBITAK-BILGEM UEKAE, Turkey
* Omair Uthmani, Edinburgh Napier University, UK
* Stefano Zanero, Politecnico di Milano, Italy
WISTP Steering Committee
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of
London, UK
* David Naccache, Ecole Normale Supérieure, France
* Joachim Posegga, Institute of IT-Security and Security Law at the
University of Passau,
Germany
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France
SPONSOR
* Co-Sponsored by IFIP WG 11.2 Pervasive Systems Security
For further inquiries, please contact Raja Naeem Akram at
r.n.akram at rhul.ac.uk
This call for papers and additional information about the conference can
be found at
www.wistp.org
Program chairs can be contacted at wistp2015 at easychair.org [We need to
get this]
---
Questa e-mail è stata controllata per individuare virus con Avast antivirus.
http://www.avast.com
****************
Per destinare il 5x1000 all'Universita' degli Studi di Milano: indicare nella dichiarazione dei redditi il codice fiscale 80012650158.
http://www.unimi.it/13084.htm?utm_source=firmaMail&utm_medium=email&utm_content=linkFirmaEmail&utm_campaign=5xmille
More information about the Om-announce
mailing list