|
The contributions may address one or more of the topics mentioned below or others that authors believe to be of specific interest to the audience:
TRUSTED TECHNOLOGIES: •Hardware & embedded software security, •Encryption technology •Identity of things •Secure Cloud of things •Network security
IOT APPLICATIONS SECURITY: •Critical infrastructures, •Connected Cars & Automotive, •Smart Home and consumer appliances , •Wearable’s, location-based services , •e-Health and other medical appliances
METHODS & BEST PRACTICES: •IoT security analysis and audit:, •Strategies for end-to-end security, •Security by design, •Privacy and privacy enhancing technologies
IoT ENVIRONMENT: •Standardization •Government level initiatives
|