11th International Conference on Information Security Theory and Practice

Future ICT technologies, such as the concepts of Ambient Intelligence, Cyber-physical Systems, and Internet of Things provide a vision of the Information Society in which: a) people and physical systems are surrounded with intelligent interactive interfaces and objects, and b) environments are capable of recognising and reacting to the presence of different individuals or events in a seamless, unobtrusive, and invisible manner. The success of future ICT technologies will depend on how secure these systems are and to what extent they protect the privacy of individuals and individuals trust them.

In 2007, Workshop in Information Security Theory and Practice (WISTP) was created as a forum for bringing together researchers and practitioners in related areas and to encourage interchange and cooperation between the research community and the industrial/consumer community. Based on the growing interest of the participants, since 2015 WISTP is a conference.

The 11th WISTP International Conference on Information Security Theory and Practice (WISTP’2017) seeks original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. We encourage submissions from other communities such as law, business, and policy that present these communities’ perspectives on technological issues.

  • Security and Privacy in Smart Devices
    • Biometrics, National ID cards
    • Embedded Systems Security and TPMs
    • Interplay of TPMs and Smart Cards
    • Mobile Codes Security
    • Mobile Devices Security
    • Mobile Malware
    • Mobile OSes Security Analysis
    • RFID Systems
    • Smart Card
    • Smart Devices Applications
    • Wireless Sensor Node
  • Security and Privacy in Networks
    • Ad Hoc Networks
    • Content Defined Networks
    • Delay-Tolerant Networks
    • Domestic Networks
    • GSM/GPRS/UMTS Systems
    • Peer-to-Peer Networks
    • Security Issues in Mobile and Ubiquitous Networks
    • Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks
    • Vehicular Networks
    • Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others
  • Security and Privacy in Architectures, Protocols, Policies, Systems and Applications
    • BYOD Contexts
    • Big Data Management
    • Cloud Systems
    • Critical Infrastructure (e.g. for Medical or Military Applications)
    • Crowdsourcing
    • Cyber-Physical Systems
    • Data and Computation Integrity
    • Digital Rights Management (DRM)
    • Distributed Systems
    • Grid Computing
    • Identity and Trust Management
    • Information Assurance
    • Information Filtering
    • Internet of Things
    • Intrusion Detection
    • Lightweight cryptography
    • Localization Systems (Tracking of People and Goods)
    • M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human)
    • Mobile Commerce
    • Multimedia Applications
    • Public Administration and Governmental Services
    • Privacy Enhancing Technologies
    • Secure self-organization and self-configuration
    • Security Models, Architecture and Protocol: for Identification and Authentication, Access Control, Data Protection
    • Security Policies (Human-Computer Interaction and Human Behavior Impact)
    • Security Measurements
    • Smart Cities
    • Social Networks
    • Systems Controlling Industrial Processes

General chair

  • Ioannis Askoxylakis, FORTH-ICS, Greece

Local organisers

  • Nikolaos Petroulakis, FORTH-ICS, Greece
  • Andreas Miaoudakis, FORTH-ICS, Greece
  • Panos Chatziadam, FORTH-ICS, Greece

Workshop/panel/tutorial chair

  • Raja Naeem Akram, Royal Holloway University of London, UK

Program Chairs

  • Ernesto Damiani, Universita` degli Studi di Milano, Italy
  • Gerhard Hancke, City University of Hong Kong, Hong Kong