posted by user: saraforesti || 8321 views || tracked by 14 users: [display]

WISTP 2012 : 6th Workshop in Information Security Theory and Practice


Conference Series : Workshop in Information Security Theory and Practice
When Jun 19, 2012 - Jun 22, 2012
Where London, UK
Submission Deadline Jan 31, 2012
Notification Due Feb 24, 2012
Final Version Due Mar 18, 2012

Call For Papers

Security and Trust in Computing Systems and Ambient Intelligence Ecosystem
June 19-22, 2012, London, UK -

Future ICT technologies, like the concepts of Ambient Intelligence and
Internet of Things provide a vision of the Information Society where
the emphasis is on surrounding people by intelligent interactive
interfaces and objects and on environments that are capable of
recognising and reacting to the presence of different individuals
in a seamless, unobtrusive and invisible manner.
The success of future ICT technologies, some of which are set as
priorities by the European Union, will depend on how secure they
will be made, how privacy and individuals' rights will be protected
and how individuals will come to trust the intelligent world that
will surround them and through which they will move.
WISTP 2012 aims to address the security and privacy issues that are
increasingly exposed by mobile and wireless communications and related
services, along with evaluating their impact on business,
individuals, and the society.

The workshop seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of security
and privacy of mobile and smart devices, as well as experimental studies
of fielded systems based on wireless communication, the application
of security technology, the implementation of systems, and lessons learned.
We encourage submissions from other communities such as law,
business and policy that present these communities' perspectives on
technological issues. Topics of interest include, but are not limited to:

* Security, Privacy and Trust in the Internet of Things
* Security and Trustworthiness in mobile and wireless networks
including Mobile ad hoc networks, RFID systems,
Wireless sensor networks and Vehicular networks
* Security, Privacy and Trust in Smart Environments
* Security, Privacy and Trust in Social Networks and Social Worlds
* Trustworthy life-logging
* Security, Privacy and Trust in e-Government and Mobile Commerce
including Biometrics and national ID cards
* Human behaviour and psychological aspects of security
including User centric security and privacy
* Lightweight cryptography
* Privacy enhancing technologies (PETs)
* Mobile code security
* Mobile devices security
* Smart card security
* Embedded systems security
* Security models and architectures
including Security and privacy policies,
Authentication and Access Control, and Security protocols

Paper Submission due: January 31, 2012 (midnight Samoa time) *FIRM*
Notification to authors: February 24, 2012
Author registration: March 18, 2012
Camera-ready due: March 18, 2012

Submissions must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or
conference/workshop with proceedings. Each submission should be
at most 16 pages in total in the Springer's LNCS format
All submissions should be anonymous (i.e., no author names/affiliations
and obvious citations). Submissions are to be made to the submission
web site (
Only PDF files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits. Accepted papers
will be published by Springer in the Lecture Notes in Computer Science
series (, and the proceedings will be
available at the workshop. The camera-ready version of the accepted papers
must follow Springer guidelines (a Latex source file will be required).

If a submitted paper is mainly the work of a student author, this paper
is eligible for the best student paper award. To participate in this
selection process, please add the word "STUDENT" in the affiliation
field in the submission form.

Authors of accepted papers must guarantee that their papers will be
presented at the workshop. At least one author of each accepted paper
is required to register with the workshop and present the paper.
For authors presenting multiple papers, one normal registration
is valid for up to two papers.

General Chairs
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK

Local Organizers
* Raja Naem Akram, ISG-SCC, Royal Holloway University of London, UK
* Lishoy Francis, ISG-SCC, Royal Holloway University of London, UK
* Emma Dobson, ISG, Royal Holloway University of London, UK

Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France

Publicity Chairs
* Sara Foresti, Universita' degli Studi di Milano, Italy
* Taeshik Shon, Ajou University, Korea
* to be extended

Program Chairs
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Joachim Posegga, Institute of IT Security and Security Law,
University of Passau, Germany

Program Committee
* Lejla Batina, Radboud University Nijmegen, Netherlands
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Levente Buttyan, Budapest University of Technology and Economics, Hungary
* Serge Chaumette, LaBRI & University of Bordeaux, France
* Jorge Cueller, Siemens, Germany
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalan, Spain
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Martin Johns, SAP Research,Germany
* Cagatay Karabat, TUBITAK BILGEM, Turkey
* Angelos Keromytis, Columbia University, USA
* Kwok Yan Lam, National University of Singapore, Singapore
* Peter Lipp, Technische Universitaet Graz, Austria
* Javier Lopez, University of Malaga, Spain
* Emmanuel Magkos, Ionian University, Greece
* Mark Manulis, Technische Universitat Darmstadt, Germany
* Louis Marinos, European Network and Information Security Agency (ENISA), EU
* Fabio Martinelli, IIT-CNR, Italy
* Aikaterini Mitrokosta, EPFL, Switzerland
* Jose Onieva, University of Malaga, Spain
* Gerardo Pelosi, University of Bergamo, Italy
* Svetla Petkova-Nikova, Katholieke Universiteit Leuven, Belgium
* Henrich C. Pohls, University of Passau, Germany
* Ilia Polian, Univ. of Passau, Germany
* Axel Poschmann, National University of Singapore, Singapore
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Bill Roscoe, Department of Computer Science, UK
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Christos Siaterlis, Joint Research Centre, EU
* George Spanoudakis, City University of London, UK
* Theo Tryfonas, University of Bristol, UK
* Michael Tunstall, University of Bristol, UK
* Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium
* Heung-Youl Youm, Soonchunhyang University, Korea
* to be extended

WISTP Steering Committee
* Claudio Ardagna, Universita' degli Studi di Milano, Italy
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France
* Jianying Zhou, Institute for Infocomm Research, Singapore

* IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at

This call for papers and additional information about the conference
can be found at

Program chairs can be contacted at

Related Resources

TPDL 2021   25th International Conference on Theory and Practice of Digital Libraries
SOFSEM 2021   47th International Conference on Current Trends in Theory and Practice of Computer Science
CRITIS 2021   The 16th International Conference on Critical Information Infrastructures Security
ICSRS--Scopus & EI 2021   2021 5th International Conference on System Reliability and Safety (ICSRS 2021)--Scopus & EI Compendex
Elec-SI-IIDS 2021   Special Issue on Design of Intelligent Intrusion Detection Systems
ICONIP 2021   The 28th International Conference on Neural Information Processing (ICONIP2021)
ICENT--EI Compendex, Scopus 2021   2021 3rd International Conference on Emerging Networks Technologies (ICENT 2021)--Ei Compendex, Scopus
WCN 2022   Wireless Communications and Networking: Theory and Practice
Scopus-DIKW-RA 2021   2021 Future Data, Information and Knowledge Research and Applications Conference (DIKW-RA 2021)
Virtual Environments for Cybersecurity 2020   SIMULATION MODELLING PRACTICE AND THEORY - Special Issue on ''Virtual Environments for Cybersecurity''