Conference Information
TrustCom 2020: International Conference on Trust, Security and Privacy in Computing and Communications
Submission Date:
2020-08-15 Extended
Notification Date:
Conference Date:
Guangzhou, China
CCF: c   CORE: a   Viewed: 52470   Tracked: 184   Attend: 56
Conference Location
Call For Papers

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.

TrustCom 2020 topics include, but are not limited to the following:

Trust Track

    Trust semantics, metrics and models
    Trusted computing platform
    Trusted network computing
    Trusted operating systems
    Trusted software and applications
    Trust in social networks
    Trust in e-commerce and e-government
    Trust in mobile and wireless communications
    Risk and reputation management
    Survivable computer systems/networks
    Trust in 5G networks
    Miscellaneous trust issues in cyber Security
    System reverse engineering
    Watermarking and security
    Cryptanalysis and security solutions

Security Track

    Network and cyber security
    Computer security
    Database security
    Web applications security
    Security policy, model and architecture
    Security in social networks
    Security in parallel and distributed systems
    Security in mobile and wireless communications
    Security in cloud/pervasive computing
    Authentication, authorization and accounting
    Security of 5G Networks
    Miscellaneous security issues
    Steganography and steganalysis
    Security-aware facial recognition

Privacy Track

    Privacy in web-based applications and services
    Privacy in database systems
    Privacy in parallel and distributed systems
    Privacy in cloud/pervasive computing
    Privacy in mobile and wireless communications
    Privacy in e-commerce and e-government
    Privacy in network deployment and management
    Privacy and trust
    Privacy and security
    Privacy and anonymity
    Privacy preservation in 5G
    Miscellaneous privacy issues
    Privacy-preserving biometrics

Forensics and Analytics Track

    Anti-forensics and analytics
    Big data forensics
    CCTV forensics
    Cloud forensics
    Computational forensics
    Cyber-physical system forensics
    Datamining for forensics
    Fingerprint forensics
    Image forensics
    Malware forensics
    Mobile app forensics (e.g. Skype, WeChat and Facebook)
    Mobile device forensics
    Multimedia forensics
    Network forensics

Emerging Tech Track

    Emerging hardware security
    Emerging security problems and solutions in edge/fog computing
    Emerging paradigms of deep learning in security
    Emerging applications of reinforcement learning for securing networks
    Emerging secure mechanisms for service delivery models
    Emerging quantum safe cryptography for 5G
    Emerging web vulnerabilities and countermeasures
    Emerging techniques in intelligent transportation systems
    Emerging network attacks & anomalies detection and prevention
    Emerging approaches to cybersecurity
    Emerging techniques in identity management
    Emerging approaches of smart contract and distributed ledger
    Emerging blockchain techniques

Submission and Publication Information:

All papers need to be submitted electronically through the conference website ( with PDF format. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. A submission is limited to 8 pages for main conference regular papers, 6 pages for workshop papers or short papers in the IEEE Computer Society Proceedings Format with Portable Document Format (.pdf). A submission can have at most 4 additional pages with the pages overlength charge if accepted. Papers must be clearly presented in English, including tables, figures, references and appendices. Papers will be selected based on their originality, significance, relevance, and clarity of presentation assessed by at least three reviewers. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. IEEE TrustCom 2020 reserves the right to exclude a paper from distribution after the conference (e.g., removal from the digital library and indexing services), if the paper is not presented at the conference. Accepted and presented papers will be included in the IEEE CPS Proceedings. Distinguished papers presented at the conference, after further revision, will be published in special issues of high quality international journals.Two or three outstanding papers will be selected to receive the Best Paper Awards.
Last updated by Dou Sun in 2020-08-10
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ruSMARTConference on Internet of Things and Smart Spaces2020-05-272020-06-182020-08-26
baa2SRDSIEEE Symposium on Reliable Distributed Systems2020-05-222020-07-172020-09-21
b4IESSInternational Conference on Exploring Services Science2013-09-142013-10-302014-02-05
b2ICSCInternational Conference on Semantic Computing2020-10-122020-11-252021-01-27
ICMTTInternational Conference on Microwave and Terahertz Technology2018-10-30 2019-01-03
RVInternational Conference on Runtime Verification2019-05-212019-07-012019-10-08
b4GreenComInternational Conference on Green Computing and Communications2020-08-082020-09-052020-11-02
ICIISInternational Conference on Industrial and Information Systems2020-08-312020-10-312020-11-26
GIISGlobal Information Infrastructure and Networking Symposium2020-07-312020-09-072020-10-28
SIUSignal Processing and Communication Applications Conference2017-02-212017-03-312017-05-15