{"id":6036,"date":"2016-05-23T16:29:06","date_gmt":"2016-05-23T14:29:06","guid":{"rendered":"http:\/\/www.internetsoziologie.at\/de\/?p=6036"},"modified":"2016-05-22T17:31:13","modified_gmt":"2016-05-22T15:31:13","slug":"cfp-international-workshop-on-security-in-the-iot-with-real-time-and-energy-constraints-iot-secure-2016","status":"publish","type":"post","link":"https:\/\/www.internetsoziologie.at\/de\/2016\/05\/23\/cfp-international-workshop-on-security-in-the-iot-with-real-time-and-energy-constraints-iot-secure-2016\/","title":{"rendered":"CFP: International Workshop on Security in the IoT with Real-Time and Energy constraints (IoT-Secure 2016)"},"content":{"rendered":"<p><a href=\"http:\/\/icacci-conference.org\/2016\/tracks#11\">http:\/\/icacci-conference.org\/2016\/tracks#11<\/a><\/p>\n<p>In conjunction with ICACCI-2016, the 5th International Conference on Advances in Computing, Communications and Informatics, September 21-24, Jaipur, India.<\/p>\n<p>ICACCI-2016 is technically co-sponsored by IEEE Communications Society and IEEE Systems, Man, and Cybernetics Society. The Conference is technically supported by IEEE SMCS Technical Committee on Soft Computing, IEEE ComSoc Internet Technical Committee (ITC) and IEEE ComSoc Technical Committee on Green Communications and Computing (TCGCC).<\/p>\n<p>*Introduction*<br \/>\nDevices we use every day are becoming connected entities across the planet.  The so-called IoT includes technologies which combine autonomous embedded sensory objects with communication intelligence. Most of the applications in the IoT have consequently strong real-time requirements and energy limitations. Moreover, the IoT can be affected by various categories of security: access to intellectual property, sabotage, espionage, cyber terrorism in critical infrastructures such as nuclear plants, railways and traffic monitoring. This imposes to design new cryptographic methods which are efficient both in terms of security, energy consumption, and time overhead.<\/p>\n<p>*Scope*<br \/>\nThe focus and scope of IoT-Secure 2016 is solely on the security aspects of the Internet of Things which have strong real-time constraints and energy limitations. We will welcome papers both from theoretical and practical aspects. Prospective authors are invited to submit original, previously unpublished work, reporting on novel and significant research contributions, on-going research projects, experimental results and recent developments related to, but not limited, the following topics:<\/p>\n<p>* Cyber-physical threats, vulnerability analysis, and countermeasures<br \/>\n* Critical infrastructure protection<br \/>\n* Communication overhead<br \/>\n* Energy-efficiency in security management<br \/>\n* Lightweight Encryption<br \/>\n* Real-Time Applications<br \/>\n* Real-time cryptosystem based on chaotic systems<br \/>\n* Security challenges in the Internet of Things<br \/>\n* Security and privacy of mobile systems<br \/>\n* Security in  highly resource-constrained network<br \/>\n* Sensor network security<br \/>\n* Security Protocols for Sensor Networks<br \/>\n* Wireless communications security<br \/>\n* \u2026<\/p>\n<p>* Important Dates *<br \/>\n     Paper Submission: July 5, 2016 09:29:00 IST<br \/>\n     Author Notification: July 25, 2016<br \/>\n     Final Manuscript Due: August 10, 2016<\/p>\n<p>* Submission*<br \/>\nYou should make your submissions through <a href=\"https:\/\/edas.info\/newPaper.php?c=22226\">EDAS<\/a>.<\/p>\n<p>Unregistered authors should first create an account on EDAS to log on. The workshop only accepts full manuscripts in the standard IEEE camera-ready format (double column, 10-point font) with minimum 3 pages and maximum 8 pages.<\/p>\n<p>* Publication*<br \/>\nAccepted and presented papers will be published in the ICACCI 2016 Proceedings which will be available through IEEE Xplore\u00ae after the conference.<\/p>\n<p>* Registration*<br \/>\nRegistration will be done through ICACCI-2016 registration system.<\/p>\n<p>* Workshop organizers*<br \/>\nMaryline Chetto, University of Nantes, France, IRCCyN laboratory {maryline.chetto@univ-nantes.fr}<br \/>\nSafwan El Assad, University of Nantes, France, IETR laboratory  {safwan.elassad@univ-nantes.fr}<\/p>\n<p>* Program committee *<br \/>\nOlivier Deforges, INSA de Rennes, IETR, France<br \/>\nWassim Hamidouche, INSA de Rennes, IETR, France<br \/>\nAudrey Queudet, University of Nantes, France<br \/>\nSanto Banerjee, University Putra Malaysia, Malaysia, Malaysia<br \/>\nThang Hoang, University of Hano\u00ef, Vietnam<br \/>\nIon Tutanescu, University of Pitesti, Romania<br \/>\nBassem Bakhache, Lebanese University, Lebanon<br \/>\nMohamad Khalil, Lebanese University, Lebanon<br \/>\nRima ASSAF, Lebanese University, Lebanon<br \/>\nRelu Tataru, Military Technical Academy, Romania<br \/>\nGhada Zaibi, ENIS, University of Sfax, Tunisia<br \/>\nOns Jallouli, University of Nantes, France<br \/>\nMohammad Abu Taha, University of Nantes, France<br \/>\nDaniel Caragata, University of Valpara\u00edso, Chile<br \/>\nDalia Battikh, Lebanese University, Lebanon<br \/>\nNabil Abdoun, University of Nantes, France<\/p>\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/icacci-conference.org\/2016\/tracks#11 In conjunction with ICACCI-2016, the 5th International Conference on Advances in Computing, Communications and Informatics, September 21-24, Jaipur, India. ICACCI-2016 is technically co-sponsored by IEEE Communications Society and IEEE &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6036","post","type-post","status-publish","format-standard","hentry","category-allgemein"],"_links":{"self":[{"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/posts\/6036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/comments?post=6036"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/posts\/6036\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/media?parent=6036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/categories?post=6036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsoziologie.at\/de\/wp-json\/wp\/v2\/tags?post=6036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}