Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    TRUST 2016 - The 9th International Conference on Trust & Trustworthy Computing

    View: 535

    Website http://trust2016.sba-research.org/ | Want to Edit it Edit Freely

    Category TRUST 2016

    Deadline: May 09, 2016 | Date: August 29, 2016-August 30, 2016

    Venue/Country: Vienna, Austria

    Updated: 2016-03-08 20:54:21 (GMT+9)

    Call For Papers - CFP

    TRUST, the international conference on Trust and Trustworthy Computing, is an stablished forum on trusted and trustworthy computing. TRUST, currently in its 9th instantiation, brings together researchers, practitioners, and decision makers interested in new ideas for designing, building, using and understanding trusted and trustworthy computing systems. TRUST invites submissions of original work on the design, operation, and effect of trusted and trustworthy computing in any relevant field.

    Topics of interest include, but are not limited to:

    -Architectures for trustworthy infrastructures

    -Emerging applications and technologies, including recent industrial research and development on trusted/trustworthy computing

    -Hardware security, including secure storage, cryptographic coprocessors, smartcards, and physically unclonable functions (PUFs)

    -Trustworthy applications, including webbased systems

    -Trusted mobile computing platforms

    -Trustworthy embedded, CyberPhysical, and Internet of Things systems

    -Security analysis and formal techniques for trusted/trustworthy computing

    -Verification of trusted/trustworthy computing (architectures, platforms, software, protocols)

    -Usability of trusted/trustworthy computing solutions and humancomputer interactions

    -Cloud security and trustworthy services

    -Trust management

    -Software engineering techniques for trustworthiness

    -Operating system security, including virtualization and monitoring

    -Cryptography for trusted computing and related applications

    -Intrusion detection and resilience leveraging trusted computing

    -Security policies and management of trusted/trustworthy systems

    -Experimental, userbased or testbed studies

    Submission

    We invite submissions of (i) full papers (up to 18 pages in LNCS format) and (ii) short papers (up to 9 pages in LNCS format).

    Full papers are expected to report substantial and wellsubstantiated original results. Short papers can present work that is not fully fleshed out but brings forth novel and stimulating

    ideas. Please submit short papers as such and please be aware that no full paper will be converted to a short paper as part of the review process.

    All submissions must be carefully anonymized for double-blind reviewing. To submit a paper please visit our submission page.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.