Conference Information
TrustCom 2021: International Conference on Trust, Security and Privacy in Computing and Communications
https://trustcom2021.sau.edu.cn/
Submission Date:
2021-04-20 Extended
Notification Date:
2021-05-30
Conference Date:
2021-08-18
Location:
Shenyang, China
Years:
20
CCF: c   CORE: a   Viewed: 58206   Tracked: 197   Attend: 61
Conference Location
Call For Papers
Introduction

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.

TrustCom 2021 topics include, but are not limited to the following:

Track 1: Trust Track

          (1) Trust semantics, metrics and models
          (2) Trusted computing platform
          (3) Trusted network computing
          (4) Trusted operating systems
          (5) Trusted software and applications
          (6) Trust in social networks
          (7) Trust in e-commerce and e-government
          (8) Trust in mobile and wireless communications
          (9) Risk and reputation management
          (10)Survivable computer systems/networks
          (11) Trust in 5G networks
          (12) Miscellaneous trust issues in cyber Security
          (13) System reverse engineering
          (14) Watermarking and security
          (15) Cryptanalysis and security solutions

Track 2: Security Track

          (1) Network and cyber security
          (2) Computer security
          (3) Database security
          (4) Web applications security
          (5) Security policy, model and architecture
          (6) Security in social networks
          (7) Security in parallel and distributed systems
          (8) Security in mobile and wireless communications
          (9) Security in cloud/pervasive computing
          (10) Authentication, authorization and accounting
          (11) Security of 5G Networks
          (12) Miscellaneous security issues
          (13) Steganography and steganalysis
          (14) Security-aware facial recognition

Track 3: Privacy Track

          (1) Privacy in web-based applications and services
          (2) Privacy in database systems
          (3) Privacy in parallel and distributed systems
          (4) Privacy in cloud/pervasive computing
          (5) Privacy in mobile and wireless communications
          (6) Privacy in e-commerce and e-government
          (7) Privacy in network deployment and management
          (8) Privacy and trust
          (9) Privacy and security
          (10) Privacy and anonymity
          (11) Privacy preservation in 5G
          (12) Miscellaneous privacy issues
          (13) Privacy-preserving biometrics

Track 4: Forensics and Analytics Track

          (1) Anti-forensics and analytics
          (2) Big data forensics
          (3) CCTV forensics
          (4) Cloud forensics
          (5) Computational forensics
          (6) Cyber-physical system forensics
          (7) Datamining for forensics
          (8) Fingerprint forensics
          (9) Image forensics
          (10) Malware forensics
          (11) Mobile app forensics (e.g. Skype, WeChat and Facebook)
          (12) Mobile device forensics
          (13) Multimedia forensics
          (14) Network forensics

Track 5: Emerging Tech Track

          (1) Emerging hardware security
          (2) Emerging security problems and solutions in edge/fog computing
          (3) Emerging paradigms of deep learning in security
          (4) Emerging applications of reinforcement learning for securing networks
          (5) Emerging secure mechanisms for service delivery models
          (6) Emerging quantum safe cryptography for 5G
          (7) Emerging techniques in intelligent transportation systems
          (8) Emerging network attacks & anomalies detection and prevention
          (9) Emerging approaches to cybersecurity
          (10) Emerging techniques in identity management
          (11) Emerging approaches of smart contract and distributed ledger
          (12) Emerging blockchain techniques
Last updated by Dou Sun in 2021-04-03
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ruSMARTConference on Internet of Things and Smart Spaces2021-06-252021-08-022021-08-26
baa2SRDSIEEE Symposium on Reliable Distributed Systems2021-04-232021-06-182021-09-20
b4IESSInternational Conference on Exploring Services Science2013-09-142013-10-302014-02-05
b2ICSCInternational Conference on Semantic Computing2020-10-122020-11-252021-01-27
ICMTTInternational Conference on Microwave and Terahertz Technology2018-10-30 2019-01-03
RVInternational Conference on Runtime Verification2019-05-212019-07-012019-10-08
ICIISInternational Conference on Industrial and Information Systems2020-08-312020-10-312020-11-26
b4GreenComInternational Conference on Green Computing and Communications2021-07-212021-09-182021-12-06
GIISGlobal Information Infrastructure and Networking Symposium2020-07-312020-09-072020-10-28
SIUSignal Processing and Communication Applications Conference2017-02-212017-03-312017-05-15
Recommendation