| |||||||||||||||
WISTP 2018 : 12th International Conference on Information Security Theory and Practice - Deadline is extended to October 14, 2018 - FIRM DEADLINEConference Series : Workshop in Information Security Theory and Practice | |||||||||||||||
Link: http://www.wistp.org | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Please accept our apologies if you receive multiple copies of this CFP
[online version] ****************************************************** Due to several requests, the deadline is extended to October 14, 2018 - FIRM DEADLINE (11:59 p.m. American Samoa time) ****************************************************** .:: Call for Papers ::. ======================= 12th WISTP International Conference on Information Security Theory and Practice (WISTP 2018) Brussels, Belgium -- 10-11 December 2018 http://www.wistp.org/ Deadline for submissions: 14 October 2018 - FIRM DEADLINE Future ICT technologies, such as the concepts of Ambient Intelligence, Cyber-physical Systems, and Internet of Things provide a vision of the Information Society in which: a) people and physical systems are surrounded with intelligent interactive interfaces and objects, and b) environments are capable of recognising and reacting to the presence of different individuals or events in a seamless, unobtrusive, and invisible manner. The success of future ICT technologies will depend on how secure these systems are and to what extent they protect the privacy of individuals and individuals trust them. The 12th WISTP International Conference on Information Security Theory and Practice (WISTP'2018) seeks original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business, and policy that present these communities' perspectives Topics of Interest: Security and Privacy in Smart Devices Biometrics, National ID cards Embedded Systems Security and TPMs Interplay of TPMs and Smart Cards Mobile Codes Security Mobile Devices Security Mobile Malware Mobile OSes Security Analysis RFID Systems Smart Card Smart Devices Applications Wireless Sensor Node Security and Privacy in Networks Ad Hoc Networks Content Defined Networks Delay-Tolerant Networks Domestic Networks GSM/GPRS/UMTS Systems Peer-to-Peer Networks Security Issues in Mobile and Ubiquitous Networks Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks Vehicular Networks Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others Security and Privacy in Architectures, Protocols, Policies, Systems and Applications BYOD Contexts Big Data Management Cloud Systems Critical Infrastructure (e.g. for Medical or Military Applications) Crowdsourcing Cyber-Physical Systems Data and Computation Integrity Digital Rights Management (DRM) Distributed Systems Grid Computing Identity and Trust Management Information Assurance Information Filtering Internet of Things Intrusion Detection Lightweight cryptography Localization Systems (Tracking of People and Goods) M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human) Mobile Commerce Multimedia Applications Public Administration and Governmental Services Privacy Enhancing Technologies Secure self-organization and self-configuration Security Models, Architecture and Protocol: for Identification and Authentication, Access Control, Data Protection Security Policies (Human-Computer Interaction and Human Behavior Impact) Security Measurements Smart Cities Social Networks Systems Controlling Industrial Processes IMPORTANT DATES Deadline for paper submission: October 14th, 2018 (11:59 p.m. AOE) - FIRM DEADLINE Notification to authors: November 5th, 2018 Author Registration: November 15th, 2018 Camera-ready version: December 2nd, 2018 Submission Instructions Submissions must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most 16 pages in total in the Springer’s LNCS format. All submissions should be anonymous (i.e., no author names/affiliations and obvious citations). Submissions are to be made to the submission web site: https://easychair.org/conferences/?conf=wistp2018 Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series, and the proceedings will be available at the conference. The camera-ready version of the accepted papers must follow Springer guidelines (a Latex source file will be required). If a submitted paper is mainly the work of a student author, this paper is eligible for the best student paper award. To participate in this selection process, please add the word "STUDENT" in the affiliation field in the submission form. Authors of accepted papers must guarantee that their papers will be presented at the conference. At least one author of each accepted paper is required to register with the conference and present the paper. For authors presenting multiple papers, one normal registration is valid for up to two papers. Scientific supports - IFIP WG 11.2 Pervasive Systems Security Journal Information Sponsorship - Information (an Open Access Journal by MDPI) will offer to main authors of Best Paper and Best Student Paper to waive the fee for a future publication in the journal. Main author of accepted papers will receive a 200€ voucher for a future publication in the journal. Note this offer is not related to an extended version of the presented papers. It can be any article from the main author. This submission will go through the whole reviewing process of the journal which is completely independent to WISTP. -- Damien Sauveron http://damien.sauveron.fr/ |
|