2nd International Workshop on IoT Privacy, Trust, and Security (IoTPTS 2016)

2nd International Workshop on IoT Privacy, Trust, and Security (IoTPTS 2016)

May 30, 2016, Xi'an, China

Held in conjunction with the 11th ACM Symposium on Information, Computer and Communications Security (ASIACCS'16

Call for Papers

The Internet of Things (IoT) is the next great technology frontier. At a basic level, IoT refers simply to networked devices, but the IoT vision is a complex ecosystem that ranges from cloud backend services and big-data analytics to home, public, industrial, and wearable sensor devices and appliances. Architectures for these systems are in the formative stages, and now is the time to ensure privacy, trust, and security are designed into these systems from the beginning.

We encourage submissions on all aspects of IoT privacy, trust, and security.

Topics of interest include (but are not limited) to the following areas:

  • Privacy and IoT data
  • Privacy attacks for IoT
  • Trust management and device discoverability for IoT
  • Usability of privacy and security systems in IoT
  • User risk perceptions and modeling for IoT
  • Policy Management and enforcement for IoT
  • Authentication and access control for users for IoT
  • Cryptography for IoT
  • Attack detection and remediation for IoT
  • Security architectures for IoT systems and applications

Important Dates

Submissions due: Feb 12, 2016  (By request, extended  to Feb 15, 2016)
Author notification: March 1, 2016 
Camera-ready due: March 15, 2016
Workshop date: May 30, 2016 


Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. All submissions should be appropriately anonymized (i.e., papers should not contain author names or affiliations, or obvious citations). Regular submissions must be written in English with at most 8 pages including the bibliography and appendices. Position papers or short papers describing preliminary work of at most 4 pages are also welcome. Submissions must be in double-column ACM format with a font no smaller than 9 point. Please use the ACM SIG Proceedings Templates (download here). Only PDF files will be accepted. Authors of accepted papers must guarantee that their papers will be presented at the workshop. At least one author of the paper must be registered at the appropriate conference rate. Accepted papers will be published by ACM Press as conference proceedings in USB thumb drives and in the ACM Digital Library.


Program Chairs

Richard Chow, Intel
Gokay Saldamli, 
Samsung Research America

PC Members

Onur Aciicmez, Yahoo
Ernie Brickell, Intel
Bogdan Carbunar, Florida International University
Alvaro Cardenas, UT Dallas
Sherman Chow, Chinese University of Hong Kong
Mihai Christodorescu, Qualcomm
José M. Del Álamo, Universidad Politécnica de Madrid
Levent Ertaul, CSU East Bay
Jason Hong, Carnegie Mellon University
Yong Ho Hwang, Samsung Electronics
Markus Jakobsson, ZapFraud Inc.
Bart Knijnenburg, Clemson University
Alfred Kobsa, UC Irvine
Kang Li, University of Georgia
Daisuke Mashima, Advanced Digital Sciences Center

Markus Miettinen, TU Darmstadt
Prashanth Mohan, Google Inc.
Pankaj Rohatgi, Cryptography Research
Reza Shokri, UT Austin
Ned Smith, Intel
Jessica Staddon, North Carolina State University
Ersin Uzun, PARC
Ihor Vasyltsov, Samsung
Cong Wang, City University of Hong Kong
Cong Zheng, Palo Alto Networks


Functional Credentials for Internet of Things

Sherman S.M. Chow (Chinese University of Hong Kong)

Accepted Papers

High-Performance and Lightweight Lattice-Based Public-Key Encryption
Johannes Buchmann, Florian Goepfert, Tim Güneysu, Tobias Oder and Thomas Pöppelmann

Physical Unclonable Functions for IoT Security
Muhammad N. Aman, Kee Chaing Chua and Biplab Sikdar

Trusted Sensors for Participatory Sensing and IoT Applications based on PUFs,
Ihtesham Haider, Michael Höberl and Bernhard Rinner

Analyzing the Security and Privacy of Cloud-based Video Surveillance Systems (Best Paper Award)
Johannes Obermaier and Martin Hutle 

Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains
Thomas Hardjono and Ned Smith

Mind The Plug! Laptop-User Recognition Through Power Consumption
Mauro Conti, Michele Nati, Enrico Rotundo and Riccardo Spolaor 




E-mail: iotpts2016@easychair.org