Special Track: Privacy, Security and Trust in the Digital Space


About:

With the rapid development and increasing complexity of computer systems and communication networks, user requirements for privacy, security and trust are becoming more and more demanding. Therefore, there is a grand challenge that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. As a result, we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security and privacy at the same time. As useful and innovative technologies, trusted computing and communications are attracting researchers with more and more attention.
The topics of interest include, but are not limited to:

  • Privacy in web-based applications and services
  • Privacy in database systems
  • Privacy in parallel and distributed systems
  • Privacy in cloud/pervasive computing
  • Privacy in mobile and wireless communications
  • Privacy in e-commerce and e-government
  • Privacy in network deployment and management
  • Privacy and trust
  • Privacy and security
  • Privacy and anonymity
  • Privacy preservation in 5G
  • Miscellaneous privacy issues
  • Privacy-preserving biometrics
  • Trust semantics, metrics and models
  • Trusted computing platform
  • Trusted network computing
  • Trusted operating systems
  • Trusted software and applications
  • Trust in social networks
  • Trust in e-commerce and e-government
  • Trust in mobile and wireless communications
  • Risk and reputation management
  • Survivable computer systems/networks
  • Trust in 5G networks
  • Miscellaneous trust issues in Cyber Security
  • System reverse engineering
  • Watermarking and security
  • Cryptanalysis and security solutions.
  • Network and cyber security
  • Computer security
  • Database security
  • Web applications security
  • Security policy, model and architecture
  • Security in social networks
  • Security in parallel and distributed systems
  • Security in mobile and wireless communications
  • Security in cloud/pervasive computing
  • Authentication, authorization and accounting
  • Security of 5G Networks
  • Miscellaneous security issues
  • Steganography and steganalysis
  • Security-aware facial recognition
  • Anti-forensics and analytics
  • Big data forensics
  • CCTV forensics
  • Cloud forensics
  • Computational forensics
  • Cyber-physical system forensics
  • Datamining for forensics
  • Fingerprint forensics
  • Image forensics
  • Malware forensics
  • Mobile app forensics (e.g. Skype, WeChat and Facebook)
  • Mobile device forensics
  • Multimedia forensics
  • Network forensics

Organizers:

  • Dalal Al-Aqeedi, National Cybersecurity Agency, Qatar.
  • Basel Katt, NTNU, Norway.
  • Chia Mu Yang, National Yang Ming Chiao Tung University, Taiwan.
  • Ahmed Badawy, Qatar University, Qatar.

Submission Guidelines

Papers should be submitted in PDF format. The results described must be unpublished and must not be under review elsewhere. Submissions must conform to Springer’s LNCS format and should not exceed 15 pages, including all text, figures, references, and appendices. Submissions not conforming to the LNCS format, exceeding 15 pages, or being obviously out of the scope of the conference, will be rejected without review. Information about the Springer LNCS format can be found at Springer. Three to five keywords characterizing the paper should be indicated at the end of the abstract.

All submissions must go through EasyChair system via Easychair


Important Dates

  • Submission Deadline: 30 June, 2024
  • Acceptance/Rejection Notification: 30 August, 2024
  • Camera-Ready Files Submission Deadline: 07 September, 2024

Publication

Please note that for every accepted paper, it is required that at least one person registers for the conference and presents the paper. All accepted papers will be included in the proceedings published as Springer’s LNCS series.