CALL FOR PAPERS

Call for Papers

Embedded systems have become pervasive in modern society, and their diffusion is still growing rapidly, apparently without limits. Applications fields are countless, ranging from automotive, telecommunications, digital healthcare, smart cards, military, satellites, computer networking, digital consumer electronics, Internet of Things, nano- or bionano-things, and so on.


The huge amount of data gathered and processed by such systems often contains Personal Identifiable Information (PII) of users, which must be protected according to the recommendations of the EU's General Data Protection Regulation (GDPR).


It is essential that users can control when and how their personal data is collected, processed, and communicated by embedded systems. It should come as no surprise that privacy has been acknowledged as an important new dimension in nowadays embedded systems design.


Together with classic embedded design metrics like area, performance and power consumption, privacy is becoming paramount too. Novel privacy protection approaches (differential privacy, k-anonymity, homomorphic encryption to name a few) promise to revolutionize the way users can protect their data, but it is still unclear how these approaches can be applied in an efficient and effective manner in embedded systems.


The HTESP workshop aims at fostering discussion on the newest privacy trends in embedded systems. Submitted papers should address cutting-edge privacy issues and solutions in the application fields of embedded computing.


Topics of interest include:

  • Scalable, robust, and privacy enhancing Embedded Computing.

  • Privacy challenges of interoperable and usable Embedded Computing.

  • Measurement of Embedded Computing privacy leakage.

  • Privacy frameworks for Embedded Computing.

  • Threat models and attack strategies for privacy in Embedded Computing.

  • Data integrity in Embedded Computing.

  • Identity and access management in Embedded Computing.

  • Privacy enhancing and anonymization techniques in Embedded Computing.

  • Trust management in Embedded Computing.

  • Testbeds, and experimental results.

  • Blockchain-based identity management and access control systems.

  • Differential privacy techniques in Embedded Computing.

  • k-anonymity techniques in Embedded Computing.

  • Data encryption in Embedded Computing.

  • Privacy-enhancing technologies.

  • Personal Data Governance.

  • Data protection in Embedded Computing.

  • Cybersecurity and data protection measures.

  • Data protection best practices across verticals

  • GDPR compliance in Embedded Computing


The Call for Paper in PDF format will soon be available.



Important Dates

Submission due: June 17, 2022 (FIRM!) June 1, 2022
Notification due: July 15, 2022 July 1, 2022
Camera-ready due: August 8, 2022 August 1, 2022
Workshop Date: October 3, 2022

Paper Submission

Papers must be submitted electronically through the workshop's management system, at: https://htesp22.hotcrp.com/

Submission Guidelines

Authors are invited to submit original technical papers for publication in HTESP 2022. Manuscripts should be written in English and should not exceed 4-6 pages including tables, figures, references and appendices. Pages must use 8.5″ x 11″ (letter) two-column format, using 10-point type on 11-point leading, with a maximum text block of 7″ wide x 9″ deep with an inter-column spacing of .25″.

Authors may use the LaTex templates provided here. (right-click – save as)

At least one author of each accepted paper is required to register to the conference and present the paper. Only registered and presented papers will be included in the EWSN 2022 Proceedings.

Paper Publication

Accepted papers will be included in the EWSN 2022 Proceedings and will be indexed in the ACM Digital Library, SCOPUS, and other prominent digital libraries.

Camera-Ready Copy Guidelines

Camera-Ready guidelines are available at the following link:
https://ewsn2022.jku.at/guidelines-for-camera-ready-preparation/