64
0
0
2019-01-21

In a fast-growing cyber security threat landscape, game-changing techniques in information security, trust, privacy and forensics are required for a sustainable future. The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-19) will be held at Rotorua, New Zealand on 5-8 August 2019.


As a leading international conference in the area of trust, information security and privacy, and forensics, the IEEE TrustCom 2019 conference aims to bring together international researchers and practitioners working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks – providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.


Topics of interest include, but not limited to:


Trust Track

· Hardware for chains and roots of trust

· Novel techniques in provenance

· Provenance for trust

· Risk and reputation management

· Software trustworthiness and quality

· Survivable computer systems/networks

· Trust in 5G networks

· Trust in automotive environments

· Trust in e-commerce and e-government

· Trust in social networks

· Trust in mobile and wireless communications

· Trust semantics, metrics and models

· Trust visualization

· Trusted computing platform

· Trusted network computing

· Trusted operating systems

· Trusted software and applications


Security Track

· Authentication, authorization and accounting

· Computer security

· Consumer/User-centric security

· Database security

· Emerging topics in information security and applied cryptography

· Emerging topics in security attributions

· Fault attacks

· Hardware security

· Machine learning applied to security applications

· Miscellaneous security issues

· Network security

· Obfuscation and reverse engineering

· Provenance for security

· Security in social networks

· Security in parallel and distributed systems

· Security in mobile and wireless communications

· Security in grid/cloud/pervasive/fog/edge computing

· Security of 5G

· Security policy, model and architecture

· Side-Channel attacks

· Web applications security


Privacy Track

· Consumer/User-centric privacy

· Miscellaneous privacy issue

· Privacy and anonymity

· Privacy and policy conformance (GDPR, HIPPA, etc.)

· Privacy and security

· Privacy and trust

· Privacy in database systems

· Privacy in grid/cloud/pervasive computing

· Privacy in e-commerce and e-government

· Privacy in mobile and wireless communications

· Privacy in network deployment and management

· Privacy in parallel and distributed systems

· Privacy in surveillance systems

· Privacy in Web-based applications and services

· Privacy preservation in 5G


Forensics and Analytics Track

· Anti-forensics

· Automotive Forensics

· Behavioural biometrics

· Big data forensics

· Biometrics

· CCTV forensics

· Cloud forensics

· Computational forensics

· Cryptanalysis

· Cyber-physical system forensics

· Data Mining for forensics

· Facial recognition

· Fingerprint forensics

· Image forensics

· Malware forensics

· Mobile app forensics (e.g. Skype, WeChat and Facebook)

· Mobile device forensics

· Multimedia forensics

· Network forensics

· Steganography and steganalysis

· System reverse engineering

· Watermarking


Emerging Technologies

· Attacks in blockchain / cryptocurrency

· Blockchain security and privacy

· Blockchain implementation

· Blockchain consensus

· Blockchain based IoT security solutions

· Blockchain in cyber physical systems

· Blockchain in social networking

· Cryptocurrencies security and privacy

· Cyber insurance technologies

· Directed Acyclic Graph (DAG) distributed ledger

· Emerging and disruptive technologies for security, privacy, trust and forensics

· Implementations of post-quantum cryptosystems

· Industry Control systems

· IoT security and privacy

· IoT implementations for security and privacy

· Post-quantum cryptography

· Security models for the post-quantum era

· Smart contract


Paper Submission


Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf).


Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Accepted and presented papers will be included in the IEEE CPS Proceedings. Distinguished papers presented at the conference, after further revision, will be recommended to high quality international journals.

登录用户可以查看和发表评论, 请前往  登录 或  注册


SCHOLAT.com 学者网
免责声明 | 关于我们 | 用户反馈
联系我们: