posted by organizer: hasaninbox || 5782 views || tracked by 10 users: [display]

EST 2017 : Seventh IEEE International Conference on Emerging Security Technologies

FacebookTwitterLinkedInGoogle

Link: http://eis.essex.ac.uk/EST2017/
 
When Sep 6, 2017 - Sep 8, 2017
Where Canterbury, UK
Submission Deadline Jun 7, 2017
Notification Due Jun 30, 2017
Final Version Due Jul 14, 2017
Categories    cryptography   cyber security   privacy and secrecy   forensics
 

Call For Papers

Seventh IEEE International Conference on Emerging Security Technologies
http://eis.essex.ac.uk/EST2017/

TOPICS

The conference invites security-oriented contributions in information technologies, robotics, cognitive systems, biotechnologies, and nanotechnologies. Novel concepts related to hardware and software implementations are equally welcomed. Previous editions included papers in biometrics and forensics, personal mobile/ wireless security, robotic and unmanned vehicle system security, perimeter, border, and homeland security, Internet and cyber-security (i.e., detection and prevention of cyber-crimes and identity theft), security of critical infrastructure systems (e.g., financial, public utilities, transportation, etc.), emergency response systems (e.g., combining space-based systems with geographical information systems), and hybrid security systems. Papers on the security of emerging fields like the internet of things, pervasive computing and body wearable health devices can also be submitted.
Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems. Topics of interest include but are not limited to:

Access control and authorization
Accountability
Anonymity
Application security
Attacks and defences
Authentication
Cloud security
Distributed systems security
Embedded systems security
Forensics
Hardware security
Intrusion detection and prevention
Malware and unwanted software
Mobile and Web security and privacy
Network and systems security
Privacy technologies and mechanisms
Simulation of security protocols
Security and privacy for the Internet of Things
Security and privacy metrics
Security and privacy policies
Security architectures
Usable security and privacy

SUBMISSION GUIDELINES

The conference is soliciting full length papers and workshop proposals on all the identified areas of research. Submissions should clearly establish the research contribution, its relevance, importance and novelty. Authors must follow the IEEE two column conference template and manuscripts should not exceed 6 pages (including references, figures, tables and text) in length. Please note that simultaneous submission of the paper to any other conference is not allowed.

THE SUBMISSION PROCESS

Paper Submission is now open!

Once a paper is submitted to the online conference system it will undergo blind review by three peers. Following the review of submitted papers, successful authors will be invited to attend and present their work at EST 2017.

IMPORTANT DATES

Workshop proposals: 08 May 2017

Paper submission: 7 June 2017

Notification of acceptance: 30 June 2017

Camera Ready: 14 July 2017

Conference Date: 6-8 September 2017

http://eis.essex.ac.uk/EST2017/

Related Resources

IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
EMERGING 2025   The Seventeenth International Conference on Emerging Networks and Systems Intelligence
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
IJCSITY 2024   International Journal of Computational Science and Information Technology
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IJCIS 2024   International Journal on Cryptography and Information Security