The Internet of Things (IoT) is the next great technology frontier. At a basic level, IoT refers simply to networked devices, but the IoT vision is a complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. Architectures for these systems are in the formative stages, and now is the time to ensure privacy, trust, and security are designed into these systems from the beginning. We encourage submissions on all aspects of IoT privacy, trust, and security. Topics of interest include (but are not limited) to the following areas:
Submissions due: Jan. 7, 2015 Author notification: Jan 31, 2015 Camera-ready due: Feb 14, 2015 Workshop date: April 14, 2015
Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Regular submissions must be written in English with at most 8 pages including the bibliography and appendices. Position papers or short papers describing preliminary work of at most 4 pages are also welcome. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of the paper must be registered at the appropriate full conference rate. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM Digital Library. Electronic submission site: https://easychair.org/conferences/?conf=iotpts2015
Program Chairs Richard Chow, Intel Gokay Saldamli, Samsung Research America PC Members Onur Aciicmez, Yahoo Ernie Brickell, Intel Alvaro Cardenas, UT Dallas Mihai Christodorescu, Qualcomm Serge Egelman, UC Berkeley Levent Ertaul, CSU East Bay Markus Jakobsson, Qualcomm Bart Knijnenburg, UC Irvine Alfred Kobsa, UC Irvine Daisuke Mashima, Fujitsu Laboratories of America Markus Miettinen, TU Darmstadt Prashanth Mohan, FireEye Inc. Francisco Rodríguez-Henríquez, CINVESTAV-IPN Pankaj Rohatgi, Cryptography Research Reza Shokri, ETH Zurich Ned Smith, Intel Jessica Staddon, Google Thorsten Strufe, TU Dresden Ersin Uzun, PARC Ihor Vasyltsov, Samsung Jesse Walker, Intel Cong Wang, City University of Hong Kong
Privilege-Based Remote Attestation: Towards Integrity Assurance for Lightweight Clients. (slides)
Tobias Rauter, Andrea Höller, Nermin Kajtazovic, and Christian Kreiner (Graz University of Technology).
Entropy Extraction from Bio-Signals in Healthcare IoT. (slides)
Ihor Vasyltsov and Seunghwan Lee. (Samsung Electronics)
A Secure Automobile Information Sharing System. (slides)
Lihua Wang, Ryo Nojima, and Shiho Moriai (National Institute of Information and Communications Technology).
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. (slides)
Feng Hao (Newcastle University), Xun Yi (RMIT University), Liqun Chen (Hewlett-Packard Laboratories) and Siamak Shahandashti (Newcastle University)
Lightweight Protection of Group Content Distribution. (slides)
Pawel Szalachowski and Adrian Perrig (ETH Zurich).
|