*** Deadline extended to March 14, 2014 (midnight Samoa time) ***
CALL FOR PAPERS *****************
EIGHTH WORKSHOP IN INFORMATION SECURITY THEORY AND PRACTICE (WISTP 2014) Securing Internet of Things June 30 - July 02, 2014, Heraklion, Greece - http://www.wistp.org/
WISTP 2014 BACKGROUND AND GOALS Future ICT technologies, such as the concepts of Ambient Intelligence, Cyber-physical Systems and Internet of Things provide a vision of the Information Society in which: a) people and physical systems are surrounded with intelligent interactive interfaces and objects, and b) environments are capable of recognising and reacting to the presence of different individuals or events in a seamless, unobtrusive and invisible manner. The success of future ICT technologies will depend on how secure these systems may be, to what extent they will protect the privacy of individuals and how individuals will come to trust them. WISTP 2014 aims to address security and privacy issues of smart devices, networks, architectures, protocols, policies, systems, and applications related to Internet of Things, along with evaluating their impact on business, individuals, and the society.
The workshop seeks original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy of Internet of Things, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business, and policy that present these communities’ perspectives on technological issues. Topics of interest include, but are not limited to:
Security and Privacy in Networks
Security and Privacy in Architectures, Protocols, Policies, Systems and Applications
IMPORTANT DATES Paper Submission due: March 14, 2014 (midnight Samoa time) FIRM Notification to authors: April 7, 2014 Author registration: April 21, 2014 Camera ready due: April 21, 2014
SUBMISSION INSTRUCTIONS Submissions must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or conference/workshop with proceedings. Each submission should be at most 16 pages in total in the Springerís LNCS format (http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). All submissions should be anonymous (i.e., no author names/affiliations and obvious citations). Submissions are to be made to the submission web site (http://www.wistp.org/submission-details/). Only PDF files will be accepted. Submissions not meeting these guidelines risk rejection without consideration of their merits. Accepted papers will be published by Springer in the Lecture Notes in Computer Science series (http://www.springeronline.com/lncs), and the proceedings will be available at the workshop. The camera-ready version of the accepted papers must follow Springer guidelines (a Latex source file will be required).
If a submitted paper is mainly the work of a student author, this paper is eligible for the best student paper award. To participate in this selection process, please add the word “STUDENT” in the affiliation field in the submission form.
Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of each accepted paper is required to register with the workshop and present the paper. For authors presenting multiple papers, one normal registration is valid for up to two papers.
KEYNOTE SPEAKERS * Bart Preneel, Katholieke Universiteit Leuven, Belgium * Timo Kasper, Ruhr-Universit‰t Bochum, Germany
WISTP 2014 COMMITTEES AND CHAIRS General Chair * Ioannis Askoxylakis, FORTH-ICS, Greece
Local Organizers * Nikolaos Petroulakis, FORTH-ICS, Greece
Workshop/Panel/Tutorial Chair * TBA
Publicity Chairs * Sara Foresti, Universita` degli Studi di Milano, Italy * Cheng-Kang Chu, Huawei, Singapore * to be extended
Program Chairs * David Naccache, Ecole Normale SupÈrieure, France * Damien Sauveron, XLIM, University of Limoges, France
Program Committee * Raja Naeem Akram, University of Waikato, NZ * Claudio A. Ardagna, Universita
degli Studi di Milano, Italy * Ioannis Askoxylakis, FORTH-ICS, Greece * Gildas Avoine, INSA de Rennes, France * Lejla Batina, Radboud University Nijmegen, The Netherlands * Lorenzo Cavallaro, Royal Holloway, University of London, UK * Herve' Chabanne, Morpho, France * Serge Chaumette, LaBRI, University Bordeaux 1, France * Mauro Conti, University of Padua, Italy * Manuel Egele, Carnegie Mellon University, USA * Jose' Maria de Fuentes, Carlos III University of Madrid, Spain * Flavio Garcia, University of Birmingham, UK * Dieter Gollmann, Hamburg University of Technology, Germany * Johann Groszschadl, Universitat Luxemburg, Luxembourg * Yong Guan, Iowa State University, USA * Gerhard Hancke, City University of Hong Kong, Hong Kong * Suleyman Kardas, TUBITAK BILGEM UEKAE, Turkey * Issa Mohammad Khalil, Qatar Fondation, Qatar * Ioannis Krontiris, Goethe University Frankfurt, Germany * Andrea Lanzi, Insitut Eurecom, France * Corrado Leita, Symantec Research Labs, France * Albert Levi, Sabanci University, Turkey * Peng Liu, Pennsylvania State University, USA * Javier Lopez, Computer Science Department, University of Malaga, Spain * Federico Maggi, Politecnico di Milano, Italy * Vashek Matyas, Masaryk University, Czech Republic * Sjouke Mauw, University of Luxembourg, Luxembourg * Aikaterini Mitrokotsa, Chalmers University of Technology, Sweden * Flemming Nielson, Technical University of Denmark, Denmark * Vladimir A Oleshchuk, University of Agder, Norway * Milan Petkovic, Eindhoven University of Technology, The Netherlands * Frank Piessens, Katholieke Universiteit Leuven, Belgium * Wolter Pieters, TU Delft, The Netherlands * Henrich C. Pohls, Institute of IT Security and Security Law at the University of Passau, Germany * David Pointcheval, ENS Computer Science Department, France * Christina Popper, Ruhr-University Bochum, Germany * Axel York Poschmann, Nanyang Technological University, Singapore * Jean-Jacques Quisquater, UCL Crypto Group, Louvain-la-Neuve, Belgium * Kui Ren, State University of New York at Buffalo, USA * Vincent Rijmen, University of Leuven, Belgium * Reihaneh Safavi-Naini, University of Calgary, Canada * Kouichi Sakurai, Kyushu University, Japan * Pierangela Samarati, Universita degli Studi di Milano, Italy * Seungwon Shin, KAIST, Korea * Jose Maria Sierra, Carlos III University of Madrid, Spain * Asia Slowinska, Vrije Universiteit Amsterdam, The Netherlands * Willy Susilo, University of Wollongong, Australia * Michael Tunstall, Cryptography Research Inc, USA * Umut Uludag, TUBITAK-BILGEM UEKAE, Turkey * Stefano Zanero, Politecnico di Milano, Italy * Jianying Zhou, Institute for Infocomm Research, Singapore * to be extended
WISTP Steering Committee * Angelos Bilas, FORTH-ICS & University of Crete, Greece * Lorenzo Cavallaro, Royal Holloway, University of London, UK * Dieter Gollmann, Hamburg University of Technology, Germany * Konstantinos Markantonakis, ISG-SCC, Royal Holloway Univ. of London, UK * Jean-Jacques Quisquater, DICE, Catholic University of Louvain, Belgium * Damien Sauveron, XLIM, University of Limoges, France
SPONSOR * Co-Sponsored by IFIP WG 11.2 Pervasive Systems Security
For further inquiries, please contact Damien Sauveron at email@example.com