posted by user: saraforesti || 10037 views || tracked by 14 users: [display]

WISTP 2012 : 6th Workshop in Information Security Theory and Practice

FacebookTwitterLinkedInGoogle


Conference Series : Workshop in Information Security Theory and Practice
 
Link: http://www.wistp.org/
 
When Jun 19, 2012 - Jun 22, 2012
Where London, UK
Submission Deadline Jan 31, 2012
Notification Due Feb 24, 2012
Final Version Due Mar 18, 2012
 

Call For Papers

SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)
Security and Trust in Computing Systems and Ambient Intelligence Ecosystem
June 19-22, 2012, London, UK - http://www.wistp.org/

WISTP 2012 BACKGROUND AND GOALS
Future ICT technologies, like the concepts of Ambient Intelligence and
Internet of Things provide a vision of the Information Society where
the emphasis is on surrounding people by intelligent interactive
interfaces and objects and on environments that are capable of
recognising and reacting to the presence of different individuals
in a seamless, unobtrusive and invisible manner.
The success of future ICT technologies, some of which are set as
priorities by the European Union, will depend on how secure they
will be made, how privacy and individuals' rights will be protected
and how individuals will come to trust the intelligent world that
will surround them and through which they will move.
WISTP 2012 aims to address the security and privacy issues that are
increasingly exposed by mobile and wireless communications and related
services, along with evaluating their impact on business,
individuals, and the society.

The workshop seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of security
and privacy of mobile and smart devices, as well as experimental studies
of fielded systems based on wireless communication, the application
of security technology, the implementation of systems, and lessons learned.
We encourage submissions from other communities such as law,
business and policy that present these communities' perspectives on
technological issues. Topics of interest include, but are not limited to:

* Security, Privacy and Trust in the Internet of Things
* Security and Trustworthiness in mobile and wireless networks
including Mobile ad hoc networks, RFID systems,
Wireless sensor networks and Vehicular networks
* Security, Privacy and Trust in Smart Environments
* Security, Privacy and Trust in Social Networks and Social Worlds
* Trustworthy life-logging
* Security, Privacy and Trust in e-Government and Mobile Commerce
including Biometrics and national ID cards
* Human behaviour and psychological aspects of security
including User centric security and privacy
* Lightweight cryptography
* Privacy enhancing technologies (PETs)
* Mobile code security
* Mobile devices security
* Smart card security
* Embedded systems security
* Security models and architectures
including Security and privacy policies,
Authentication and Access Control, and Security protocols

IMPORTANT DATES
Paper Submission due: January 31, 2012 (midnight Samoa time) *FIRM*
Notification to authors: February 24, 2012
Author registration: March 18, 2012
Camera-ready due: March 18, 2012

SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or
conference/workshop with proceedings. Each submission should be
at most 16 pages in total in the Springer's LNCS format
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0).
All submissions should be anonymous (i.e., no author names/affiliations
and obvious citations). Submissions are to be made to the submission
web site (http://www.wistp.org/submission-details/).
Only PDF files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits. Accepted papers
will be published by Springer in the Lecture Notes in Computer Science
series (http://www.springeronline.com/lncs), and the proceedings will be
available at the workshop. The camera-ready version of the accepted papers
must follow Springer guidelines (a Latex source file will be required).

If a submitted paper is mainly the work of a student author, this paper
is eligible for the best student paper award. To participate in this
selection process, please add the word "STUDENT" in the affiliation
field in the submission form.

Authors of accepted papers must guarantee that their papers will be
presented at the workshop. At least one author of each accepted paper
is required to register with the workshop and present the paper.
For authors presenting multiple papers, one normal registration
is valid for up to two papers.

WISTP 2012 COMMITTEES AND CHAIRS
General Chairs
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK

Local Organizers
* Raja Naem Akram, ISG-SCC, Royal Holloway University of London, UK
* Lishoy Francis, ISG-SCC, Royal Holloway University of London, UK
* Emma Dobson, ISG, Royal Holloway University of London, UK

Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France

Publicity Chairs
* Sara Foresti, Universita' degli Studi di Milano, Italy
* Taeshik Shon, Ajou University, Korea
* to be extended

Program Chairs
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Joachim Posegga, Institute of IT Security and Security Law,
University of Passau, Germany

Program Committee
* Lejla Batina, Radboud University Nijmegen, Netherlands
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Levente Buttyan, Budapest University of Technology and Economics, Hungary
* Serge Chaumette, LaBRI & University of Bordeaux, France
* Jorge Cueller, Siemens, Germany
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalan, Spain
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Martin Johns, SAP Research,Germany
* Cagatay Karabat, TUBITAK BILGEM, Turkey
* Angelos Keromytis, Columbia University, USA
* Kwok Yan Lam, National University of Singapore, Singapore
* Peter Lipp, Technische Universitaet Graz, Austria
* Javier Lopez, University of Malaga, Spain
* Emmanuel Magkos, Ionian University, Greece
* Mark Manulis, Technische Universitat Darmstadt, Germany
* Louis Marinos, European Network and Information Security Agency (ENISA), EU
* Fabio Martinelli, IIT-CNR, Italy
* Aikaterini Mitrokosta, EPFL, Switzerland
* Jose Onieva, University of Malaga, Spain
* Gerardo Pelosi, University of Bergamo, Italy
* Svetla Petkova-Nikova, Katholieke Universiteit Leuven, Belgium
* Henrich C. Pohls, University of Passau, Germany
* Ilia Polian, Univ. of Passau, Germany
* Axel Poschmann, National University of Singapore, Singapore
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Bill Roscoe, Department of Computer Science, UK
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Christos Siaterlis, Joint Research Centre, EU
* George Spanoudakis, City University of London, UK
* Theo Tryfonas, University of Bristol, UK
* Michael Tunstall, University of Bristol, UK
* Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium
* Heung-Youl Youm, Soonchunhyang University, Korea
* to be extended

WISTP Steering Committee
* Claudio Ardagna, Universita' degli Studi di Milano, Italy
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France
* Jianying Zhou, Institute for Infocomm Research, Singapore

SPONSOR
* IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at
damien.sauveron@unilim.fr


This call for papers and additional information about the conference
can be found at http://www.wistp.org/

Program chairs can be contacted at wistp2012@ics.forth.gr

Related Resources

IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
SCID @ AsiaCCS 2025   The 2nd workshop on Security-Centric Strategies for Combating Information Disorder
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
ICICA 2025   2025 The 14th International Conference on Information Communication and Applications (ICICA 2025)
ICISS 2025   ACM--2025 The 8th International Conference on Information Science and Systems (ICISS 2025)
CGIP--EI 2025   2025 3rd International Conference on Computer Graphics and Image Processing (CGIP 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust