| |||||||||||||||
Connect Security World 2016 : Connect Security World, Embedded Security for IoT Systems, Networks and Devices | |||||||||||||||
Link: http://www.connectsecurityworld.com | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
The contributions may address one or more of the topics mentioned below or others that authors believe to be of specific interest to the audience:
TRUSTED TECHNOLOGIES: •Hardware & embedded software security, •Encryption technology •Identity of things •Secure Cloud of things •Network security IOT APPLICATIONS SECURITY: •Critical infrastructures, •Connected Cars & Automotive, •Smart Home and consumer appliances , •Wearable’s, location-based services , •e-Health and other medical appliances METHODS & BEST PRACTICES: •IoT security analysis and audit:, •Strategies for end-to-end security, •Security by design, •Privacy and privacy enhancing technologies IoT ENVIRONMENT: •Standardization •Government level initiatives |
|