| |||||||||||||
WISTP 2012 : 6th Workshop in Information Security Theory and PracticeConference Series : Workshop in Information Security Theory and Practice | |||||||||||||
Link: http://www.wistp.org/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)
Security and Trust in Computing Systems and Ambient Intelligence Ecosystem June 19-22, 2012, London, UK - http://www.wistp.org/ WISTP 2012 BACKGROUND AND GOALS Future ICT technologies, like the concepts of Ambient Intelligence and Internet of Things provide a vision of the Information Society where the emphasis is on surrounding people by intelligent interactive interfaces and objects and on environments that are capable of recognising and reacting to the presence of different individuals in a seamless, unobtrusive and invisible manner. The success of future ICT technologies, some of which are set as priorities by the European Union, will depend on how secure they will be made, how privacy and individuals' rights will be protected and how individuals will come to trust the intelligent world that will surround them and through which they will move. WISTP 2012 aims to address the security and privacy issues that are increasingly exposed by mobile and wireless communications and related services, along with evaluating their impact on business, individuals, and the society. The workshop seeks submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy of mobile and smart devices, as well as experimental studies of fielded systems based on wireless communication, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business and policy that present these communities' perspectives on technological issues. Topics of interest include, but are not limited to: * Security, Privacy and Trust in the Internet of Things * Security and Trustworthiness in mobile and wireless networks including Mobile ad hoc networks, RFID systems, Wireless sensor networks and Vehicular networks * Security, Privacy and Trust in Smart Environments * Security, Privacy and Trust in Social Networks and Social Worlds * Trustworthy life-logging * Security, Privacy and Trust in e-Government and Mobile Commerce including Biometrics and national ID cards * Human behaviour and psychological aspects of security including User centric security and privacy * Lightweight cryptography * Privacy enhancing technologies (PETs) * Mobile code security * Mobile devices security * Smart card security * Embedded systems security * Security models and architectures including Security and privacy policies, Authentication and Access Control, and Security protocols IMPORTANT DATES Paper Submission due: January 31, 2012 (midnight Samoa time) *FIRM* Notification to authors: February 24, 2012 Author registration: March 18, 2012 Camera-ready due: March 18, 2012 SUBMISSION INSTRUCTIONS Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most 16 pages in total in the Springer's LNCS format (http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). All submissions should be anonymous (i.e., no author names/affiliations and obvious citations). Submissions are to be made to the submission web site (http://www.wistp.org/submission-details/). Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series (http://www.springeronline.com/lncs), and the proceedings will be available at the workshop. The camera-ready version of the accepted papers must follow Springer guidelines (a Latex source file will be required). If a submitted paper is mainly the work of a student author, this paper is eligible for the best student paper award. To participate in this selection process, please add the word "STUDENT" in the affiliation field in the submission form. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of each accepted paper is required to register with the workshop and present the paper. For authors presenting multiple papers, one normal registration is valid for up to two papers. WISTP 2012 COMMITTEES AND CHAIRS General Chairs * Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK * Gerhard Hancke, ISG, Royal Holloway University of London, UK * Keith Mayes, ISG-SCC, Royal Holloway University of London, UK Local Organizers * Raja Naem Akram, ISG-SCC, Royal Holloway University of London, UK * Lishoy Francis, ISG-SCC, Royal Holloway University of London, UK * Emma Dobson, ISG, Royal Holloway University of London, UK Workshop/Panel/Tutorial Chair * Damien Sauveron, XLIM, University of Limoges, France Publicity Chairs * Sara Foresti, Universita' degli Studi di Milano, Italy * Taeshik Shon, Ajou University, Korea * to be extended Program Chairs * Ioannis Askoxylakis, FORTH-ICS, Greece * Joachim Posegga, Institute of IT Security and Security Law, University of Passau, Germany Program Committee * Lejla Batina, Radboud University Nijmegen, Netherlands * Angelos Bilas, FORTH-ICS & University of Crete, Greece * Levente Buttyan, Budapest University of Technology and Economics, Hungary * Serge Chaumette, LaBRI & University of Bordeaux, France * Jorge Cueller, Siemens, Germany * Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalan, Spain * Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands * Michael Huth, Imperial College London, UK * Martin Johns, SAP Research,Germany * Cagatay Karabat, TUBITAK BILGEM, Turkey * Angelos Keromytis, Columbia University, USA * Kwok Yan Lam, National University of Singapore, Singapore * Peter Lipp, Technische Universitaet Graz, Austria * Javier Lopez, University of Malaga, Spain * Emmanuel Magkos, Ionian University, Greece * Mark Manulis, Technische Universitat Darmstadt, Germany * Louis Marinos, European Network and Information Security Agency (ENISA), EU * Fabio Martinelli, IIT-CNR, Italy * Aikaterini Mitrokosta, EPFL, Switzerland * Jose Onieva, University of Malaga, Spain * Gerardo Pelosi, University of Bergamo, Italy * Svetla Petkova-Nikova, Katholieke Universiteit Leuven, Belgium * Henrich C. Pohls, University of Passau, Germany * Ilia Polian, Univ. of Passau, Germany * Axel Poschmann, National University of Singapore, Singapore * Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium * Bill Roscoe, Department of Computer Science, UK * Kouichi Sakurai, Kyushu University, Japan * Pierangela Samarati, Universita' degli Studi di Milano, Italy * Christos Siaterlis, Joint Research Centre, EU * George Spanoudakis, City University of London, UK * Theo Tryfonas, University of Bristol, UK * Michael Tunstall, University of Bristol, UK * Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium * Heung-Youl Youm, Soonchunhyang University, Korea * to be extended WISTP Steering Committee * Claudio Ardagna, Universita' degli Studi di Milano, Italy * Angelos Bilas, FORTH-ICS & University of Crete, Greece * Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK * Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium * Damien Sauveron, XLIM, University of Limoges, France * Jianying Zhou, Institute for Infocomm Research, Singapore SPONSOR * IFIP WG 11.2 Pervasive Systems Security For further inquiries, please contact Damien Sauveron at damien.sauveron@unilim.fr This call for papers and additional information about the conference can be found at http://www.wistp.org/ Program chairs can be contacted at wistp2012@ics.forth.gr |
|