Security Trust and Privacy
Topics include (but are not limited to):
Security & Privacy for Smart Devices (e.g., Smartphones)
Wireless and mobile privacy and anonymity
Secure localization and location privacy
Cellular network fraud and security
Jamming attacks and defenses
Key extraction, agreement, or distribution
Theoretical foundations, cryptographic primitives, and formal methods
NFC and smart payment applications
Security and privacy for mobile sensing systems
Wireless or mobile security and privacy in health, automotive, avionics, or smart grid applications
Self-tracking/Quantified Self Security and Privacy
Physical Tracking Security and Privacy
Usable Mobile Security and Privacy
Economics of Mobile Security and Privacy
Bring Your Own Device (BYOD) Security
Mobile malware and platform security
Named data networking security and privacy
Software defined networking security and privacy
Novel security methods using software defined networking
Body area sensor networking security and privacy
Security of incremental deployment
Security and privacy of participatory sensing networks
Practical implementations of cryptographic protocols in emerging networks
Threat and vulnerability analysis for emerging networks
Economics of emerging network security
Cross-layer design for security and privacy in emerging networks
Denial of service in emerging networks
Authentication and access control in emerging networks
Emerging and needed standards in emerging network security
We encourage submissions of papers discussing industrial research and development. Topics of interest include, but are not limited to:
access control
accountability
ad hoc networks
anonymity
applied cryptography
authentication
biometrics
database security
data protection
digital content protection
digital forensic
distributed systems security
electronic payments
embedded systems security
inference control
information hiding
identity management
information flow control
integrity
intrusion detection
formal security methods
language-based security
network security
phishing and spam prevention
privacy
risk analysis and Management
secure electronic voting
security architectures
security economics
security metrics
security models
security and privacy in cloud scenarios
security and privacy in complex systems
security and privacy in location services
security and privacy for mobile code
security and privacy in pervasive/ubiquitous computing
security and privacy policies
security and privacy in social networks
security and privacy in web services
security verification
software security
steganography
systems security
trust models and management
trustworthy user devices
web security
wireless security