posted by user: ardagna || 4969 views || tracked by 10 users: [display]

WISTP 2010 : Fourth Workshop in Information Security Theory and Practice (WISTP 2010) - Security and Privacy of Pervasive Systems and Smart Devices

FacebookTwitterLinkedInGoogle


Conference Series : Workshop in Information Security Theory and Practice
 
Link: http://www.wistp.org/
 
When Apr 13, 2010 - Apr 14, 2010
Where Passau, Germany
Submission Deadline Dec 4, 2009
Notification Due Jan 17, 2010
Final Version Due Feb 1, 2010
Categories    security   privacy   pervasive systems   smart devices
 

Call For Papers

*****************
CALL FOR PAPERS
*****************

FOURTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2010):
Security and Privacy of Pervasive Systems and Smart Devices
April 13-14, Passau, Germany - http://www.wistp.org/


WISTP 2010 BACKGROUND AND GOALS
The impact of pervasive and smart devices on our daily lives is ever
increasing, and the rapid technological development of information
technologies ensures that this impact is constantly changing. It is
imperative that these complex and resource constrained technologies
are not vulnerable to attack. This workshop will consider the full
impact of the use of pervasive and smart technologies on individuals,
and society at large, with regard to the security and privacy of the
systems that make use of them.

The workshop seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of security
and privacy of pervasive systems and smart devices, as well as
experimental studies of fielded systems.
We encourage submissions that address the application of security
technology, the implementation of systems, and lessons learned. We
encourage submissions from other communities such as law and business
that present these communities' perspectives on technological issues.
Topics of interest include, but are not limited to:

* Access control
* Ad hoc networks security
* Anonymity
* Biometrics, national ID cards
* Data and application security and privacy
* Data protection
* Delay-tolerant network security
* Digital rights management (DRM) in pervasive environments
* Domestic network security
* Embedded systems security and TPMs
* Human and psychological aspects of security
* Human-computer interaction and human behavior impact for security
* Identity management
* Information assurance and trust management
* Interplay of TPMs and smart cards
* Intrusion detection and information filtering
* Mobile codes security
* Mobile commerce security
* Mobile devices security
* New applications for secure RFID systems
* Peer-to-peer security
* Privacy enhancing technologies
* RFID and NFC systems security
* Secure self-organization and self-configuration
* Security in location services
* Security issues in mobile and ubiquitous networks
* Security metrics
* Security models and architecture
* Security of GSM/GPRS/UMTS systems
* Security policies
* Security protocols
* Sensor networks security
* Smart card security
* Smart devices applications
* Vehicular network security
* Wireless communication security
* Wireless sensor node security


IMPORTANT DATES
Paper submission due: November 20, 2009 (midnight Samoa time) *FIRM DEADLINE*
Notification to authors: January 17, 2010
Author registration: February 1, 2010
Camera-ready due: February 1, 2010


SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal, a
conference, or a workshop with proceedings. Papers should be at most
15 pages including the bibliography and well-marked appendices (using
11-point font and reasonable margins), and should be in single-column
format. Committee members are not required to read the appendices,
and so the paper should be intelligible without them. All submissions
should be appropriately anonymized (i.e., papers should not contain
author names or affiliations, or obvious citations). Submissions are
to be made to the submission web site
(http://www.wistp.org/submission-details/). Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection
without consideration of their merits. Papers must be received by the
deadline of November 20, 2009. Accepted papers will be published by
Springer in the Lecture Notes in Computer Science series. The
camera-ready version of the accepted papers must follow Springer
guidelines (a Latex source file will be required).

If a submitted paper is mainly the result of the work of a student
author, this paper could have the chance to be selected as "Best
student paper" (even if the paper has been written with senior
co-authors). To participate to this selection process, please add the
word "STUDENT" in the affiliation field in the submission form.

Authors of accepted papers must guarantee that their papers will be
presented at the workshop. At least one author of each accepted paper
is required to register with the workshop and present the paper. For
authors presenting multiple papers, one normal registration is valid
for up to two papers.


WISTP 2010 COMMITTEES AND CHAIRS

General Chairs
* Joachim Posegga, University of Passau, Germany
* Konstantinos Markantonakis, Royal Holloway University of
London, UK

Program Chairs
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Michael Tunstall, University of Bristol, UK

Workshop/Panel/Tutorial Chair
* Damien Sauveron, University of Limoges, France

Publicity Chairs
* Claudio A. Ardagna, Universita' degli Studi di Milano, Italy
* Ioannis G. Askoxylakis, FORTH-ICS, Greece
* Gerhard Hancke, ISG, Royal Holloway University of London, UK

Local Organization
* Joachim Posegga, University of Passau, Germany

Program Committee
* Rafael Accorsi, IIG, University of Freiburg, Germany
* Claudio A. Ardagna, Department of Information Technologies,
Universita' degli Studi di Milano, Italy
* Francois Arnault, XLIM, University of Limoges, France
* Ioannis G. Askoxylakis, FORTH-ICS, Greece
* Gildas Avoine, Catholic University of Louvain, Belgium
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Carlo Blundo, University of Salerno, Italy
* Marco Casassa Mont, HP Labs, UK
* Serge Chaumette. LaBRI, University Bordeaux 1, France
* Sabrina De Capitani di Vimercati, Department of Information
Technologies, Universita' degli Studi di Milano, Italy
* Jan de Meer, Brandenburg Technical University (BTU), Germany
* Estibaliz Delgado, European Software Institute (ESI), Spain
* Tassos Dimitriou, Athens Information Technology, Greece
* Sara Foresti, Department of Information Technologies,
Universita' degli Studi di Milano, Italy
* Flavio Garcia, Radboud University Nijmegen, Netherlands
* Stefanos Gritzalis, Info-Sec-Lab, University of the Aegean, Greece
* Yong Guan, Iowa State University, USA
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Ragib Hasan, University of Illinois at Urbana Champaign, USA
* Olivier Heen, INRIA, France
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Sotiris Ioannidis, FORTH-ICS & University of Crete, Greece
* Sokratis Katsikas, Dept. of Technology Education & Digital Systems,
University of Piraeus, Greece
* Evangelos Kranakis, Carleton University, Canada
* Michiharu Kudo, IBM Research, Japan
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway
University of London, UK
* Olivier Markowitch, ULB, Belgium
* Fabio Martinelli, Information Security Group, IIT-CNR, Italy
* Sjouke Mauw, SATOSS of Compute Science and Communications,
University of Luxembourg, Luxembourg
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK
* Carlos Maziero, Pontifical Catholic University of Parana State
Curitiba PR, Brazil
* Chris Mitchell, ISG, Royal Holloway University of London, UK
* Stefaan Motte, NXP Semiconductors, Belgium
* Jose Onieva. Computer Science Department, University of Malaga, Spain
* Rolf Oppliger, eSECURITY Technologies, Switzerland
* Dan Page, Department of Computer Science, University of Bristol, UK
* Stefano Paraboschi, University of Bergamo, Italy
* Pierre Paradinas, INRIA & CNAM, France
* Gerardo Pelosi, University of Bergamo, Italy
* Erik Poll, SOS (Security of Systems) group of the Radboud
University Nijmegen, Netherlands
* Konstantinos Rantos, GSPAEG at the Hellenic Ministry of Interior,
Public Administration and Decentralisation, Greece
* Kui Ren, Illinois Institute of Technology, USA
* Vincent Rijmen, Katholieke Universiteit Leuven, Belgium
* Rei Safavi-Naini, Center for Information Security and Cryptography,
University of Calgary, Canada
* Damien Sauveron, University of Limoges, France
* Daniel Schreckling, Institute for IT Security and Security Law,
University of Passau, Germany
* Byron Thomas, SiVenture, UK
* Erik Zenner, Technical University of Denmark, Danemark
* Bo Zhu, Computer Security Laboratory, University of Concordia, Canada

WISTP Steering Committee
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, the Netherlands
* Konstantinos Markantonakis, Royal Holloway University of
London, UK
* Chris Mitchell, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, Catholic University of Louvain,
Belgium
* Damien Sauveron, University of Limoges, France


SPONSOR
* IFIP WG 11.2 Pervasive Systems Security

For further inquiries, please contact Damien Sauveron at
damien.sauveron@unilim.fr

Related Resources

InCIT 2024   The 8th International Conference on Information Technology
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
LAJC 2024   Latin-American Journal of Computing
CSW 2024   2024 3rd International Conference on Cyber Security
ACM ICNCC 2024   ACM--2024 The 13th International Conference on Networks, Communication and Computing (ICNCC 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
JoL 2024   International Journal of Law
BDPC 2025   2025 3rd International Conference on Big Data and Privacy Computing (BDPC 2025)
SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI
ICISE 2024   ACM--2024 9th International Conference on Information Systems Engineering (ICISE 2024)