NetSec
Threads by month
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
December 2011
- 1 participants
- 1 discussions
Call for Papers: WISTP 2012 - 6th Workshop in Information Security Theory and Practice
by Henrich C. Pöhls 20 Dec '11
by Henrich C. Pöhls 20 Dec '11
20 Dec '11
Liebe NetSec-Mitglieder,
aufgrund des niedrigen Traffics weiss ich garnicht ob diese Liste noch jemand abboniert hat.
Ich wollte eigentlich nach sehen, ob auf dieser Liste bereits der CfP für die WISTP 2012
verteilt wurde, denn die Deadline ist der 31. Januar 2012.
Ich hoffe Sie haben den CfP nicht schon mehrfach anderweitig erhalten.
Viele Grüße,
Henrich C. Pöhls
*****************
CALL FOR PAPERS
*****************
SIXTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2012)
Security and Trust in Computing Systems and Ambient Intelligence Ecosystem
June 19-22, 2012, London, UK - http://www.wistp.org/
WISTP 2012 BACKGROUND AND GOALS
Future ICT technologies, like the concepts of Ambient Intelligence and
Internet of Things provide a vision of the Information Society where
the emphasis is on surrounding people by intelligent interactive
interfaces and objects and on environments that are capable of
recognising and reacting to the presence of different individuals
in a seamless, unobtrusive and invisible manner.
The success of future ICT technologies, some of which are set as
priorities by the European Union, will depend on how secure they
will be made, how privacy and individuals' rights will be protected
and how individuals will come to trust the intelligent world that
will surround them and through which they will move.
WISTP 2012 aims to address the security and privacy issues that are
increasingly exposed by mobile and wireless communications and related
services, along with evaluating their impact on business,
individuals, and the society.
The workshop seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of security
and privacy of mobile and smart devices, as well as experimental studies
of fielded systems based on wireless communication, the application
of security technology, the implementation of systems, and lessons learned.
We encourage submissions from other communities such as law,
business and policy that present these communities' perspectives on
technological issues. Topics of interest include, but are not limited to:
* Security, Privacy and Trust in the Internet of Things
* Security and Trustworthiness in mobile and wireless networks
including Mobile ad hoc networks, RFID systems,
Wireless sensor networks and Vehicular networks
* Security, Privacy and Trust in Smart Environments
* Security, Privacy and Trust in Social Networks and Social Worlds
* Trustworthy life-logging
* Security, Privacy and Trust in e-Government and Mobile Commerce
including Biometrics and national ID cards
* Human behaviour and psychological aspects of security
including User centric security and privacy
* Lightweight cryptography
* Privacy enhancing technologies (PETs)
* Mobile code security
* Mobile devices security
* Smart card security
* Embedded systems security
* Security models and architectures
including Security and privacy policies,
Authentication and Access Control, and Security protocols
IMPORTANT DATES
Paper Submission due: January 31, 2012 *firm deadline*
Notification to authors: February 24, 2012
Author registration: March 18, 2012
Camera-ready due: March 18, 2012
SUBMISSION INSTRUCTIONS
Submissions must not substantially overlap with papers that have been
published or that are simultaneously submitted to a journal or
conference/workshop with proceedings. Each submission should be
at most 16 pages in total in the Springer's LNCS format
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0)
All submissions should be anonymous (i.e., no author names/affiliations
and obvious citations). Submissions are to be made to the submission
web site (http://www.wistp.org/submission-details/)
Only PDF files will be accepted. Submissions not meeting these guidelines
risk rejection without consideration of their merits. Accepted papers
will be published by Springer in the Lecture Notes in Computer Science
series (http://www.springeronline.com/lncs) and the proceedings will be
available at the workshop. The camera-ready version of the accepted papers
must follow Springer guidelines (a Latex source file will be required).
If a submitted paper is mainly the work of a student author, this paper
is eligible for the best student paper award. To participate in this
selection process, please add the word "STUDENT" in the affiliation
field in the submission form.
Authors of accepted papers must guarantee that their papers will be
presented at the workshop. At least one author of each accepted paper
is required to register with the workshop and present the paper.
For authors presenting multiple papers, one normal registration
is valid for up to two papers.
WISTP 2012 COMMITTEES AND CHAIRS
General Chairs
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Gerhard Hancke, ISG, Royal Holloway University of London, UK
* Keith Mayes, ISG-SCC, Royal Holloway University of London, UK
Local Organizers
* Raja Naem Akram, ISG-SCC, Royal Holloway University of London, UK
* Lishoy Francis, ISG-SCC, Royal Holloway University of London, UK
* Emma Dobson, ISG, Royal Holloway University of London, UK
Workshop/Panel/Tutorial Chair
* Damien Sauveron, XLIM, University of Limoges, France
Publicity Chairs
* Sara Foresti, Universita' degli Studi di Milano, Italy
* Taeshik Shon, Ajou University, Korea
* to be extended
Program Chairs
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Joachim Posegga, Institute of IT Security and Security Law,
University of Passau, Germany
Program Committee
* Lejla Batina, Radboud University Nijmegen, Netherlands
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Levente Buttyan, Budapest University of Technology and Economics, Hungary
* Serge Chaumette, LaBRI & University of Bordeaux, France
* Jorge Cueller, Siemens, Germany
* Josep Domingo-Ferrer, Universitat Rovira i Virgili, Catalan, Spain
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen, Netherlands
* Michael Huth, Imperial College London, UK
* Martin Johns, SAP Research,Germany
* Cagatay Karabat, TUBITAK BILGEM, Turkey
* Angelos Keromytis, Columbia University, USA
* Kwok Yan Lam, National University of Singapore, Singapore
* Peter Lipp, Technische Universitaet Graz, Austria
* Javier Lopez, University of Malaga, Spain
* Emmanuel Magkos, Ionian University, Greece
* Mark Manulis, Technische Universitat Darmstadt, Germany
* Louis Marinos, European Network and Information Security Agency (ENISA), EU
* Fabio Martinelli, IIT-CNR, Italy
* Aikaterini Mitrokosta, EPFL, Switzerland
* Jose Onieva, University of Malaga, Spain
* Gerardo Pelosi, University of Bergamo, Italy
* Svetla Petkova-Nikova, Katholieke Universiteit Leuven, Belgium
* Henrich C. Pohls, University of Passau, Germany
* Ilia Polian, Univ. of Passau, Germany
* Axel Poschmann, National University of Singapore, Singapore
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Bill Roscoe, Department of Computer Science, UK
* Kouichi Sakurai, Kyushu University, Japan
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Christos Siaterlis, Joint Research Centre, EU
* George Spanoudakis, City University of London, UK
* Theo Tryfonas, University of Bristol, UK
* Michael Tunstall, University of Bristol, UK
* Ingrid Verbauwhede, Katholieke Universiteit Leuven, Belgium
* Heung-Youl Youm, Soonchunhyang University, Korea
* to be extended
WISTP Steering Committee
* Claudio Ardagna, Universita' degli Studi di Milano, Italy
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, ISG-SCC, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium
* Damien Sauveron, XLIM, University of Limoges, France
* Jianying Zhou, Institute for Infocomm Research, Singapore
SPONSOR
* IFIP WG 11.2 Pervasive Systems Security
For further inquiries, please contact Damien Sauveron at
damien.sauveron(a)unilim.fr
This call for papers and additional information about the conference
can be found at http://www.wistp.org/
Program chairs can be contacted at wistp2012(a)ics.forth.gr
1
0