allconferencecfpalerts
   

Event       Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

 

The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16)

google+
Views: 755                 

When :  2016-08-23

Where :  Tianjin, China

Submission Deadline :  2016-04-15

Categories :   Computer Science & Information Technology ,  Internet Computing      

Untitled Document

The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16)

23-26 August, 2016

Tianjin, China.

Call For Papers

The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16) will be held in Tianjin, China on 23-26 August 2016. The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.

Topics

  • Trust Track

    • Trust semantics, metrics and models
    • Trusted computing platform
    • Trusted network computing
    • Trusted operating systems
    • Trusted software and applications
    • Trust in social networks
    • Trust in e-commerce and e-government
    • Trust in mobile and wireless communications
    • Risk and reputation management
    • Survivable computer systems/networks
    • Trust of 5G
    • Miscellaneous trust issues

    Security Track

    • Network security
    • Computer security
    • Database security
    • Web applications security
    • Security policy, model and architecture
    • Security in social networks
    • Security in parallel and distributed systems
    • Security in mobile and wireless communications
    • Security in grid/cloud/pervasive computing
    • Authentication, authorization and accounting
    • Security of 5G
    • Miscellaneous security issues

    Privacy Track

    • Privacy in Web-based applications and services
    • Privacy in database systems
    • Privacy in parallel and distributed systems
    • Privacy in grid/cloud/pervasive computing
    • Privacy in mobile and wireless communications
    • Privacy in e-commerce and e-government
    • Privacy in network deployment and management
    • Privacy and trust
    • Privacy and security
    • Privacy and anonymity
    • Privacy preservation in 5G
    • Miscellaneous privacy issues

    Forensics Track

    • Anti-forensics
    • Biometrics
    • Cryptanalysis
    • Big data forensics
    • CCTV forensics
    • Cloud forensics
    • Computational forensics
    • Cyber-physical system forensics
    • Datamining for forensics
    • Facial recognition
    • Fingerprint forensics
    • Image forensics
    • Malware forensics
    • Mobile app forensics (e.g. Skype, WeChat and Facebook)
    • Mobile device forensics
    • Multimedia forensics
    • Network forensics
    • Steganography and steganalysis
    • System reverse engineering
    • Watermarking

IMPORTANT DATES            

  • Paper submission: April 15th, 2016
  •                        
  • Notification of acceptance:May 31st, 2016
  •            
  • Final manuscripts due: July 1st, 2016
  •                       

    User Name : nivesh
    Posted on


    Related CFPs

    IJCACS   International Journal of Control, Automation, Communication and Systems
    CYBI 2026   13th International Conference on Cybernetics & Informatics (CYBI 2026)
    WiMoNe 2026   18th International Conference on Wireless & Mobile Networks
    MSE 2026   10th International Conference on Materials Science and Engineering (MSE 2026)

    All Rights Reserved @ Call for Papers - Conference & Journals