posted by user: pengzhangzhang || 7692 views || tracked by 11 users: [display]

TrustID 2013 : The 3rd IEEE International Symposium on Trust and Identity in Mobile Internet, Computing and Communications

FacebookTwitterLinkedInGoogle

Link: http://anss.org.au/trustcom2013/workshops.html
 
When Jul 16, 2013 - Jul 18, 2013
Where Melbourne, Australia
Submission Deadline Apr 1, 2013
Notification Due May 1, 2013
Final Version Due May 10, 2013
Categories    trust   identity   security   privacy
 

Call For Papers

The 3rd IEEE International Symposium on Trust and Identity in Mobile Internet, Computing and Communications
(TrustID 2013)
In conjunction with
The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13)
July 16-18, 2013, Melbourne, Australia
(http://anss.org.au/trustcom2013/workshops.html)

Call for Papers
Trust and identity have become important factors that influence the success of our mobile life. Current research in trust and identity still faces a number of challenges, e.g. trustworthiness of trust/identity management systems, usability and robustness of trust/identity management, trust and identity management with privacy enhancement, adaptability and scalability issues, efficient power consumption support, etc. Due to dynamically changed computing environments, mobility, limited computing capability, restricted user interface for human-device interaction, instant communication characteristics and user privacy requirements, these challenges are more difficult to overcome in the context of mobile internet, computing and communications. Following the success of TrustID 2011 and 2012, TrustID 2013 aims at providing a forum for continuously discussing the latest academic and industrial research results related to trust and identity in the area of mobile internet, computing and communications. Topics of interest include, but are not limited to:

 Perspective of trust and identity and their development
 Architecture, theories and technologies of trust/identity management
 Trust modeling methodologies
 Mobile computing trust technologies, trust evaluation, reputation/recommender systems
 Technologies and theories of identity management
 Digital identity management for trust and privacy enhancement
 Systems, applications and standardizations about trust and identity
 Applications and case studies of trust and identity systems
 Challenges and issues for practical deployment of trust and identity management systems
 Social and psychological issues of trust and identity
 Business issues related to trust and identity
 Human-computer interaction for trust and identity
 Usable trust and identity studies
 Trust and identity in Internet of Things

Important Dates
Paper submission deadline: 1st April, 2013
Author notification: 1st May, 2013
Final manuscript due: 10th May, 2013
Registration due: 10th May, 2013
Workshop date: 16th July, 2013

Submission Instructions
Prospective authors are invited to submit manuscripts reporting original unpublished research and recent developments in the topics related to the workshop. The length of the papers should not exceed 6 pages + 2 pages for over length charges (IEEE Computer Society Proceedings Manuscripts style: two columns, single-spaced, 10-point font), including figures and references. You can confirm the IEEE Computer Society Proceedings Author Guidelines at the following web page: URL:
http://www.computer.org/portal/web/cscps/formatting

Submissions should be sent by email to (pengzhangzhang@gmail.com) with the subject "TrustID2013 PAPER SUBMISSION".

Publication
Once accepted, the paper will be included into the IEEE conference proceedings published by IEEE Computer Society Press (indexed by EI). At least one of the authors of any accepted paper is requested to register the paper. Distinguished papers, after further revisions, will be invited for possible publication in special issues of prestige international journals indexed by SCI and EI.

Program Co-Chairs
Zheng Yan
Xidian University, China/ Aalto University, Finland
Peng Zhang
Xi’an University of Post and Telecommunications, China
Valtteri Niemi
University of Turku, Finland

Honorary Chair
Raimo Kantola
Aalto University, Finland

PC Members (In alphabetical order)
Yu Chen, EPFL, Switzerland
Alvin Chin, Nokia Research Center, China
Ioanna Dionysiou, University of Nicosia, Cyprus
Yan Dong, Renmin University of China, China
Shengnan Han, Stockholm University, Sweden
Weili Han, Fudan University, China
Silke Holtmanns, Nokia Research Center, Finland
Yu Hua, Huazhong University of Science and Technology, China
Gabriele Lenzini, University of Luxembourg, Luxembourg
Abdallah Mahamed, Institut Mines-Telecom, , France
Yuexin Peng, Beijing University of Post and Telecommunications, China
Marinella Petrocchi, Istituto di Informatica e Telematica, CNR, Italy
Lei Shu, Osaka University, Japan
Qinghua Wang, Aalto University, Finland
Junze Wang, Huazhong University of Science and Technology, China
Mingjun Wang, Xidian University, China
Yan Wang, Macquarie University, Australia
Andrew G. West, University of Pennsylvania, USA
Yafei Yang, Qualcomm, USA
Dajiang Zhang, Nokia, China
Yan Zhang, Simula Research Laboratory, Norway

Contact

Please email inquiries concerning TrustID 2013 to:
Prof. Peng Zhang (pengzhangzhang@gmail.com).

Related Resources

IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ICISSP 2025   11th International Conference on Information Systems Security and Privacy
GenAI and LVMs for Biometrics 2025   IEEE Transactions on Biometrics, Behavior, and Identity Science (T-BIOM) Special Issue on Generative AI and Large Vision-Language Models for Biometrics
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
OID 2025   12th Open Identity Summit
BDPC 2025   IEEE--2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)