Conference Information
TrustCom 2019: International Conference on Trust, Security and Privacy in Computing and Communications
https://crow.org.nz/Trustcom2019
Submission Date:
2019-02-28
Notification Date:
2019-04-27
Conference Date:
2019-08-05
Location:
Rotorua, New Zealand
Years:
18
CCF: c   CORE: a   Viewed: 34623   Tracked: 133   Attend: 31

Conference Location
Advertisment
Call For Papers
In a fast-growing cyber security threat landscape, game-changing techniques in information security, trust, privacy and forensics are required for a sustainable future. The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-19) will be held at Rotorua, New Zealand on 5-8 August 2019.

As a leading international conference in the area of trust, information security and privacy, and forensics, the IEEE TrustCom 2019 conference aims to bring together international researchers and practitioners working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks – providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.

Topics of interest include, but not limited to:

Trust Track 
·         Hardware for chains and roots of trust
·         Novel techniques in provenance
·         Provenance for trust
·         Risk and reputation management
·         Software trustworthiness and quality
·         Survivable computer systems/networks
·         Trust in 5G networks
·         Trust in automotive environments
·         Trust in e-commerce and e-government
·         Trust in social networks
·         Trust in mobile and wireless communications
·         Trust semantics, metrics and models
·         Trust visualization
·         Trusted computing platform
·         Trusted network computing
·         Trusted operating systems
·         Trusted software and applications

Security Track
·         Authentication, authorization and accounting 
·         Computer security
·         Consumer/User-centric security
·         Database security
·         Emerging topics in information security and applied cryptography
·         Emerging topics in security attributions 
·         Fault attacks
·         Hardware security
·         Machine learning applied to security applications
·         Miscellaneous security issues
·         Network security
·         Obfuscation and reverse engineering
·         Provenance for security
·         Security in social networks
·         Security in parallel and distributed systems
·         Security in mobile and wireless communications
·         Security in grid/cloud/pervasive/fog/edge computing
·         Security of 5G
·         Security policy, model and architecture
·         Side-Channel attacks
·         Web applications security

Privacy Track
·         Consumer/User-centric privacy 
·         Miscellaneous privacy issue
·         Privacy and anonymity
·         Privacy and policy conformance (GDPR, HIPPA, etc.)
·         Privacy and security
·         Privacy and trust
·         Privacy in database systems
·         Privacy in grid/cloud/pervasive computing
·         Privacy in e-commerce and e-government
·         Privacy in mobile and wireless communications
·         Privacy in network deployment and management
·         Privacy in parallel and distributed systems
·         Privacy in surveillance systems
·         Privacy in Web-based applications and services
·         Privacy preservation in 5G

Forensics and Analytics Track
·         Anti-forensics
·         Automotive Forensics
·         Behavioural biometrics
·         Big data forensics
·         Biometrics
·         CCTV forensics
·         Cloud forensics
·         Computational forensics
·         Cryptanalysis
·         Cyber-physical system forensics
·         Data Mining for forensics
·         Facial recognition
·         Fingerprint forensics
·         Image forensics
·         Malware forensics
·         Mobile app forensics (e.g. Skype, WeChat and Facebook)
·         Mobile device forensics
·         Multimedia forensics
·         Network forensics
·         Steganography and steganalysis
·         System reverse engineering
·         Watermarking

Emerging Technologies
·         Attacks in blockchain / cryptocurrency
·         Blockchain security and privacy
·         Blockchain implementation
·         Blockchain consensus
·         Blockchain based IoT security solutions
·         Blockchain in cyber physical systems
·         Blockchain in social networking
·         Cryptocurrencies security and privacy
·         Cyber insurance technologies
·         Directed Acyclic Graph (DAG) distributed ledger
·         Emerging and disruptive technologies for security, privacy, trust and forensics  
·         Implementations of post-quantum cryptosystems
·         Industry Control systems
·         IoT security and privacy
·         IoT implementations for security and privacy
·         Post-quantum cryptography
·         Security models for the post-quantum era
·         Smart contract

Paper Submission

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf). 

Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Accepted and presented papers will be included in the IEEE CPS Proceedings. Distinguished papers presented at the conference, after further revision, will be recommended to high quality international journals.
Last updated by Dou Sun in 2018-12-01
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
CSCCInternational Conference on Circuits, Systems, Communications and Computers2018-06-30 2018-07-14
baa2SRDSIEEE Symposium on Reliable Distributed Systems2019-04-262019-06-212019-10-01
b4IESSInternational Conference on Exploring Services Science2013-09-142013-10-302014-02-05
SmartBlockInternational Conference on Smart Blockchain2019-08-152019-09-012019-10-11
b2ICSCInternational Conference on Semantic Computing2018-09-282018-11-302019-01-30
ESASIEEE International Workshop on E-Health Systems and Semantic Web2016-03-062016-03-282016-06-10
BDAInternational Conference on Big Data Analytics2019-07-252019-09-162019-12-17
b4GreenComInternational Conference on Green Computing and Communications2019-04-142019-05-122019-07-14
SeGAHInternational Conference on Serious Games and Applications for Health2015-11-132015-12-202016-05-11
CIARPIberoamerican Congress on Pattern Recognition2017-05-212017-08-012017-11-07
Related Journals
CCFFull NameImpact FactorPublisherISSN
ACM Transactions on Modeling and Computer SimulationACM1049-3301
bIEEE Transaction on Communications1.365IEEE0090-6778
International Journal of Security, Privacy and Trust Management AIRCC2319-4103
Multidimensional Systems and Signal Processing0.857Springer0923-6082
cNeural Processing Letters0.750Springer1370-4621
cComputer Communications2.613ELSEVIER0140-3664
cNetworks0.943Wiley Periodicals, Inc.1097-0037
bIEEE Transaction on Wireless Communications2.152IEEE1536-1276
Scientometrics2.133Springer0138-9130
Statistical Methodology ELSEVIER1572-3127
Recommendation