Conference Information
WISTP 2018: International Conference on Information Security Theory and Practice
Submission Date:
Notification Date:
Conference Date:
Brussels, Belgium
CORE: c   Viewed: 9660   Tracked: 1   Attend: 0

Call For Papers
Topics of interest include, but are not limited to

    Security and Privacy in Smart Devices
        Biometrics, National ID cards
        Embedded Systems Security and TPMs
        Interplay of TPMs and Smart Cards
        Mobile Codes Security
        Mobile Devices Security
        Mobile Malware
        Mobile OSes Security Analysis
        RFID Systems
        Smart Card
        Smart Devices Applications
        Wireless Sensor Node

    Security and Privacy in Networks
        Ad Hoc Networks
        Content Defined Networks
        Delay-Tolerant Networks
        Domestic Networks
        GSM/GPRS/UMTS Systems
        Peer-to-Peer Networks
        Security Issues in Mobile and Ubiquitous Networks
        Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks
        Vehicular Networks
        Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others

    Security and Privacy in Architectures, Protocols, Policies, Systems and Applications
        BYOD Contexts
        Big Data Management
        Cloud Systems
        Critical Infrastructure (e.g. for Medical or Military Applications)
        Cyber-Physical Systems
        Data and Computation Integrity
        Digital Rights Management (DRM)
        Distributed Systems
        Grid Computing
        Identity and Trust Management
        Information Assurance
        Information Filtering
        Internet of Things
        Intrusion Detection
        Lightweight cryptography
        Localization Systems (Tracking of People and Goods)
        M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human)
        Mobile Commerce
        Multimedia Applications
        Public Administration and Governmental Services
        Privacy Enhancing Technologies
        Secure self-organization and self-configuration
        Security Models, Architecture and Protocol: for Identification and Authentication, Access Control, Data Protection
        Security Policies (Human-Computer Interaction and Human Behavior Impact)
        Security Measurements
        Smart Cities
        Social Networks
        Systems Controlling Industrial Processes
Last updated by Dou Sun in 2018-09-11
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICAITAInternational Conference on Advanced Information Technologies and Applications2021-07-102021-07-172021-07-24
MulGraBInternational Conference on Multimedia, Computer Graphics and Broadcasting2015-06-302015-07-152015-11-25
ICCATEInternational Conference on Computers and Advanced Technology in Education2012-12-102012-12-202013-01-14
ICCTIMInternational Conference on Computing Technology and Information Management2017-11-07 2017-12-08
cIFIPTMIFIP WG 11.11 International Conference on Trust Management2019-04-092019-05-122019-07-17
BDCIEEE/ACM International Symposium on Big Data Computing2015-07-032015-08-212015-12-07
ITIAInternational Conference on Internet of Things and Intelligent Applications2020-08-152020-09-152020-11-27
ITE'International conference on Integrating Technology in Education2022-11-122022-12-312023-07-22
CVCComputer Vision Conference2018-11-012018-11-152019-04-25
NetSysInternational Conference on Networked Systems2021-05-282021-06-302021-09-13