allconferencecfpalerts
   

Event       Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

 

10th WISTP International Conference on Information Security Theory and Practice (WISTP 2016)

google+
Views: 761                 

When :  2016-09-26

Where :  Greece

Submission Deadline :  2016-05-03

Categories :   Networks & Communications ,  Software Engineering & Security      

Untitled Document

10th WISTP International Conference on Information Security Theory and Practice (WISTP 2016)

September 26-27,2016 

Greece

Call For Papers

The 10th WISTP International Conference on Information Security Theory and Practice (WISTP'2016) seeks original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business, and policy that present these communities' perspectives on technological issues.

Topics

* Security and Privacy in Smart Devices 
-- Biometrics, National ID cards 
-- Embedded Systems Security and TPMs 
-- Interplay of TPMs and Smart Cards 
-- Mobile Codes Security 
-- Mobile Devices Security 
-- Mobile Malware 
-- Mobile OSes Security Analysis 
-- RFID Systems 
-- Smart Card 
-- Smart Devices Applications 
-- Wireless Sensor Node 

* Security and Privacy in Networks 
-- Ad Hoc Networks 
-- Content Defined Networks 
-- Delay-Tolerant Networks 
-- Domestic Networks 
-- GSM/GPRS/UMTS Systems 
-- Mobile Networks 
-- Peer-to-Peer Networks 
-- Pervasive and Ubiquitous Systems 
-- Sensor Networks: 
Campus Area, Body Area, Sensor and Metropolitan Area Networks 
-- Vehicular Networks 
-- Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others 

* Security and Privacy in Architectures, Protocols, Policies, 
Systems and Applications 
-- BYOD Contexts 
-- Big Data Management 
-- Cloud Systems 
-- Critical Infrastructure (e.g. for Medical or Military Applications) 
-- Crowdsourcing 
-- Cyber-Physical Systems 
-- Data and Computation Integrity 
-- Digital Rights Management (DRM) 
-- Distributed Systems 
-- Grid Computing 
-- Identity and Trust Management 
-- Information Assurance 
-- Information Filtering 
-- Internet of Things 
-- Intrusion Detection 
-- Lightweight cryptography 
-- Location Services (Tracking of People and Goods) 
-- M2M (Machine to Machine), H2M (Human to Machine) and 
M2H (Machine to Human) 
-- Mobile Commerce 
-- Multimedia Applications 
-- Public Administration and Governmental Services 
-- Privacy Enhancing Technologies 
-- Secure self-organization and self-configuration 
-- Security Models, Architecture, and Protocol 
for Identification and Authentication, Access Control, 
Data Protection 
-- Security Policies 
(Human-Computer Interaction and Human Behavior Impact) 
-- Security Measurements 
-- Smart Cities 
-- Social Networks 
-- Systems Controlling Industrial Processes 

IMPORTANT DATES

  • Paper submission: May 3, 2016
  •                        
  • Notification of acceptance:July 4, 2016
  •            
  • Final manuscripts due: July 14, 2016
  •                       

    User Name : MANI
    Posted on


    Related CFPs

    IJCACS   International Journal of Control, Automation, Communication and Systems
    IJASUC   International Journal of Ad hoc, Sensor & Ubiquitous Computing
    IJASUC   International Journal of Ad hoc, Sensor & Ubiquitous Computing
    IJITCS   International Journal of Information Technology Convergence and services

    All Rights Reserved @ Call for Papers - Conference & Journals