When: |
|
15 Jun through 17 Jun 2015 |
CFP Deadline:
|
|
13 Feb 2015
|
Where: |
|
|
Website URL: |
|
|
|
|
-
|
Keywords:
Event description:
-----------------------------------------------
<br>Extended submission deadline: February 13th, 2015.
<br>Proceedings published by Springer
<br>Best papers to be published in Logic Journal of the IGPL (http://jigpal.oxfordjournals.org/)
<br>-----------------------------------------------
<br>
<br>
<br>CALL FOR PAPERS CISIS 2015 - SPECIAL SESSION "Cryptographic routines and protocols for constrained hardware"
<br>
<br>CISIS 2015 - 8th International Conference on Computational Intelligence in Security for Information Systems
<br>15th-17th June, 2015 - Burgos, Spain
<br>http://cisis.usal.es
<br>
<br>SPECIAL SESSION "Cryptographic routines and protocols for constrained hardware"
<br>-------------------------------------------------------------------------------
<br>Smart objects are becoming more and more present in our everyday life: tiny sensors and/or actuators populate smart cities, crops, wearables... Many of those devices rely on hardware with limited capabilities ...
Read more
-----------------------------------------------
<br>Extended submission deadline: February 13th, 2015.
<br>Proceedings published by Springer
<br>Best papers to be published in Logic Journal of the IGPL (http://jigpal.oxfordjournals.org/)
<br>-----------------------------------------------
<br>
<br>
<br>CALL FOR PAPERS CISIS 2015 - SPECIAL SESSION "Cryptographic routines and protocols for constrained hardware"
<br>
<br>CISIS 2015 - 8th International Conference on Computational Intelligence in Security for Information Systems
<br>15th-17th June, 2015 - Burgos, Spain
<br>http://cisis.usal.es
<br>
<br>SPECIAL SESSION "Cryptographic routines and protocols for constrained hardware"
<br>-------------------------------------------------------------------------------
<br>Smart objects are becoming more and more present in our everyday life: tiny sensors and/or actuators populate smart cities, crops, wearables... Many of those devices rely on hardware with limited capabilities and depend on batteries for their power supply. In other cases, available energy is scarce by definition -like in near field communications- or hardware is extremely constrained due to lack of space and the necessity for reduced production costs. However, cryptographic routines and protocols may become too intensive in terms of computations or data transmission. It is therefore necessary to find alternative ways of executing such routines with minimal energy consumption and maximal simplicity of computations.
<br>
<br>The goal of this special session is to bring together researchers working on different scenarios –including, but not restricted to, wireless sensor networks, near field communications, smartcards, Internet of Things, Internet of Multimedia Things, ad-hoc networks- that still show opportunities for improvement in routines related to secure communications, key distribution, authentication and/or non-repudiation, access control, privacy-preserving computations, secure multiparty computations and others.
<br>
<br>Paper submission deadline - February 13th, 2015
<br>
<br>As in the past, the CISIS 2015 proceedings are to be published by Springer in the Advances in Intelligent Systems and Computing Series.
<br>
<br>After the conference, a selection of the best contributions will be published in a special issue of Logic Journal of the IGPL (http://jigpal.oxfordjournals.org/)
<br>
<br>CHAIRS OF THE SPECIAL SESSION
<br>-----------------------------
<br>Juan Álvaro Muñoz Naranjo
<br>OAK TEAM
<br>INRIA (France)
<br>juan-alvaro.munoz-naranjo@inria.fr
<br>www.hpca.ual.es/~jalvaro
<br>
<br>Leocadio González Casado
<br>HPC-Algorithms
<br>University of Almería (Spain)
<br>leo@ual.es
<br>http://www.hpca.ual.es/~leo/
<br>
<br>ABOUT CISIS 2015
<br>----------------
<br>CISIS aims to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event.
<br>
<br>CISIS is included in the ranking of the best conferences (B category) established by the Computer Science Conference Ranking of the Computing Research and Education Association of Australasia (in 2008), and Excellence in Research for Australia (in 2010).
<br>
<br>In conjunction with:
<br>10th International Conference on Soft Computing Models in Industrial and Environmental Applications SOCO 2015
<br>and
<br>6th International Conference on EUropean Transnational Education ICEUTE 2015
<br>
<br>
Posting date:
19 May 2015 |
207 views
Placement:
Not-featured (How do I make my event featured?)
Flag
(Report this event)