RFIDSec: Radio Frequency Identification: Security and Privacy Issues

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
RFIDSec 2016 12th Workshop on RFID and IoT Security
Nov 30, 2016 - Dec 2, 2016 Hong Kong Sep 12, 2016
RFIDSec 2014 The 10th Workshop on RFID Security
Jul 21, 2014 - Jul 23, 2014 Oxford, United Kingdom Mar 1, 2014
RFIDsec 2013 RFIDsec 2013 - Workshop on RFID Security 2013
Jul 9, 2013 - Jul 11, 2013 Graz, Austria Apr 2, 2013
RFIDSec 2010 Radio Frequency Identification Security
Jun 8, 2010 - Jun 10, 2010 Istanbul, Turkey Apr 20, 2010
 
 

Present CFP : 2016

Started in 2005, RFIDsec has become the premier venue devoted to security and privacy of Radio Frequency Identification (RFID). The nature of radio-enabled item identification and automatic data capture has significantly changed over the years driven by the interest in overarching applications such as the Internet-of-Things and cyber-physical systems. As such, RFIDsec has also broadened its scope and seeks papers describing any contributions to security and privacy in any application area related to any constrained devices, such as sensor nodes, smart wearables, smart cards, programmable logic controllers (PLCs) and RFID tags.

Topics of interest include:
- System security aspects related to any emerging application area of constrained platforms, e.g. Internet-of-Things, cyber-physical systems, e-health devices, etc.
- Implementations of cryptography and protocols with constrained resources in terms of energy, power, computation resources and memory footprint
- Secure software and hardware architectures and software for embedded constrained devices and systems
- Side-channel, tamper and reverse-engineering resistant designs and countermeasures for constrained platforms
- Physical-layer security and contextual authentication/pairing for constrained devices
- User-centric security issues, e.g. continuous user authentication, user-centric data privacy management, user consent for pervasively sensed data, etc.
- Design issues related to reliability and scalability of security services in large systems, e.g. key management, device updates and security life cycle
 

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
CSW 2024   2024 3rd International Conference on Cyber Security
ICBICC 2024   2024 International Conference on Big Data, IoT, and Cloud Computing (ICBICC 2024)
IoT-SECFOR 2024   The 8th International Workshop on Security and Forensics of IoT
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
CSITY 2024   10th International Conference on Computer Science, Engineering and Information Technology
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1
ECTIJ 2024   Economics, Commerce and Trade Management: An International Journal