Conference Information
WISTP 2024: International Conference on Information Security Theory and Practice
https://wistp2024.roc.cnam.fr/Submission Date: |
2024-01-15 |
Notification Date: |
2024-02-05 |
Conference Date: |
2024-02-29 |
Location: |
Paris, France |
Years: |
14 |
CORE: c Viewed: 15649 Tracked: 2 Attend: 0
Call For Papers
The 14th WISTP International Conference on Information Security Theory and Practice (WISTP’2024) is actively soliciting original submissions from academia and industry. The conference welcomes original research papers encompassing a wide range of theoretical and practical dimensions of security and privacy. In addition, the conference encourages submissions that include experimental studies of fielded systems, explore the application of security technology, highlight successful system implementations, and share valuable lessons learned. Moreover, the organizers invite submissions from other communities, including law, business, and policy, which provide unique perspectives on technological issues. WISTP’2024 aims to facilitate a comprehensive and diverse discussion on information security theory and practice.
Prospective authors are invited to submit original, previously unpublished work, reporting on novel and significant research contributions, ongoing research projects, experimental results and recent developments related to, but not limited to, the following topics:
Security and Privacy in Smart Devices
Biometrics, National ID cards
Embedded Systems Security and TPMs
Interplay of TPMs and Smart Cards
Mobile Codes Security
Mobile Devices Security
Mobile Malware
Mobile OSes Security Analysis
RFID Systems
Smart Card
Smart Devices Applications
Wireless Sensor Node
Security and Privacy in Networks
Ad Hoc Networks
Content Defined Networks
Delay-Tolerant Networks
Domestic Networks
GSM/GPRS/UMTS Systems
Peer-to-Peer Networks
Security Issues in Mobile and Ubiquitous Networks
Sensor Networks: Campus Area, Body Area, Sensor and Metropolitan Area Networks
Vehicular Networks
Wireless Communication: Bluetooth, NFC, WiFi, WiMAX, others
Security and Privacy in Architectures, Protocols, Policies, Systems and Applications
BYOD Contexts
Big Data Management
Cloud Systems
Critical Infrastructure (e.g. for Medical or Military Applications)
Crowdsourcing
Cyber-Physical Systems
Data and Computation Integrity
Digital Rights Management (DRM)
Distributed Systems
Grid Computing
Identity and Trust Management
Information Assurance
Information Filtering
Internet of Things
Intrusion Detection
Lightweight cryptography
Localization Systems (Tracking of People and Goods)
M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human)
Mobile Commerce
Multimedia Applications
Public Administration and Governmental Services
Privacy Enhancing Technologies
Secure self-organization and self-configuration
Security Models, Architecture and Protocol: for Identification and Authentication, Access
Control, Data Protection
Security Policies (Human-Computer Interaction and Human Behavior Impact)
Security Measurements
Smart Cities
Social Networks
Systems Controlling Industrial Processes
Last updated by Dou Sun in 2023-11-18
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| c | ACISP | Australasian Conference on Information Security and Privacy | 2025-02-19 | 2025-04-08 | 2025-07-14 | ||
| b | ITW | Information Theory Workshop | 2013-07-12 | 2013-09-09 | |||
| b | b1 | ISIT | International Symposium on Information Theory | 2019-01-20 | 2019-03-31 | 2019-07-07 | |
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | INSCRYPT | International Conference on Information Security and Cryptology | 2025-06-15 | 2025-08-01 | 2025-10-19 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 | ||
| c | ISA' | International Conference on Information Security and Assurance | 2016-01-30 | 2016-02-15 | 2016-03-24 | ||
| b | ISPEC | International Conference on Information Security Practice and Experience | 2024-05-13 | 2024-06-24 | 2024-10-25 | ||
| c | WISTP | International Conference on Information Security Theory and Practice | 2024-01-15 | 2024-02-05 | 2024-02-29 |
| Short | Full Name | Conference |
|---|---|---|
| IAS | International Conference on Information Assurance and Security | 2015-12-07 |
| ACISP | Australasian Conference on Information Security and Privacy | 2025-07-14 |
| ITW | Information Theory Workshop | 2013-09-09 |
| ISIT | International Symposium on Information Theory | 2019-07-07 |
| ISC | Information Security Conference | 2025-10-20 |
| INSCRYPT | International Conference on Information Security and Cryptology | 2025-10-19 |
| ICISC | International Conference on Information Security and Cryptology | 2015-11-25 |
| ISA' | International Conference on Information Security and Assurance | 2016-03-24 |
| ISPEC | International Conference on Information Security Practice and Experience | 2024-10-25 |
| WISTP | International Conference on Information Security Theory and Practice | 2024-02-29 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| Journal of Information Science Theory and Practice | KISTI | 2287-9099 | ||
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
| Information Security Technical Report | Elsevier | 1363-4127 | ||
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| International Journal of Information Security | 2.400 | Springer | 1615-5262 | |
| c | Journal of Information Security and Applications | 3.800 | Elsevier | 2214-2126 |
| a | IEEE Transactions on Information Theory | 2.200 | IEEE | 0018-9448 |
| c | EURASIP Journal on Information Security | 2.500 | Springer | 1687-417X |
| Information Technology & People | 4.900 | Emerald | 0959-3845 | |
| c | International Journal of Information and Computer Security | Inderscience | 1744-1765 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| Journal of Information Science Theory and Practice | KISTI | |
| International Journal of Information Security and Privacy | 0.800 | Idea Group Inc |
| Information Security Technical Report | Elsevier | |
| IET Information Security | 1.300 | IET |
| International Journal of Information Security | 2.400 | Springer |
| Journal of Information Security and Applications | 3.800 | Elsevier |
| IEEE Transactions on Information Theory | 2.200 | IEEE |
| EURASIP Journal on Information Security | 2.500 | Springer |
| Information Technology & People | 4.900 | Emerald |
| International Journal of Information and Computer Security | Inderscience |