TrustCom 2022 - Call for Papers
Home Call for Papers Call For Workshops Workshops/Symposia Keynote Speeches Important Dates Organisation Committee Steering Committee Program Committee Conference Program Venue Accommodation Accepted Paper Final Paper Instruction Registration Contacts BigDataSE-2022 CSE-2022 EUC-2022 iSCI-2022 The conference will be held hybrid on 9-11 December 2022.
Call For Papers
Download - Call for Papers: PDF
Important Dates
Workshop Proposal Due:
15 June, 2022
Paper Submission Deadline:
15 July, 2022
Authors Notification:
20 August, 2022
Author Submission Site Available for Approval:
9 September, 2022
Final Manuscript Due:
10 September, 2022  → 23 September, 2022(hard)
Registration Due:
20 September, 2022  → 30 September, 2022
Conference Date:
28-30 October, 2022  → 9-11 December, 2022
Scope and Topics

Track 1: Trust Track

  • Trust semantics, metrics and models
  • Trusted computing platform
  • Trusted network computing
  • Trusted operating systems
  • Trusted software and applications
  • Trust in social networks
  • Trust in e-commerce and e-government
  • Trust in mobile and wireless communications
  • Risk and reputation management
  • Survivable computer systems/networks
  • Trust in 5G networks
  • Miscellaneous trust issues in cyber Security
  • System reverse engineering
  • Watermarking and security
  • Cryptanalysis and security solutions
Track 2: Security Track
  • Network and cyber security
  • Computer security
  • Database security
  • Web applications security
  • Security policy, model and architecture
  • Security in social networks
  • Security in parallel and distributed systems
  • Security in mobile and wireless communications
  • Security in cloud/pervasive computing
  • Authentication, authorization and accounting
  • Security of 5G Networks
  • Miscellaneous security issues
  • Steganography and steganalysis
  • Security-aware facial recognition
Track 3: Privacy Track
  • Privacy in web-based applications and services
  • Privacy in database systems
  • Privacy in parallel and distributed systems
  • Privacy in cloud/pervasive computing
  • Privacy in mobile and wireless communications
  • Privacy in e-commerce and e-government
  • Privacy in network deployment and management
  • Privacy and trust
  • Privacy and security
  • Privacy and anonymity
  • Privacy preservation in 5G
  • Miscellaneous privacy issues
  • Privacy-preserving biometrics
Track 4: Forensics and Analytics Track
  • Anti-forensics and analytics
  • Big data forensics
  • CCTV forensics
  • Cloud forensics
  • Computational forensics
  • Cyber-physical system forensics
  • Datamining for forensics
  • Fingerprint forensics
  • Image forensics
  • Malware forensics
  • Mobile app forensics (e.g. Skype, WeChat and Facebook)
  • Mobile device forensics
  • Multimedia forensics
  • Network forensics
Track 5: Emerging Tech Track
  • Emerging hardware security
  • Emerging security problems and solutions in edge/fog computing
  • Emerging paradigms of deep learning in security
  • Emerging applications of reinforcement learning for securing networks
  • Emerging secure mechanisms for service delivery models
  • Emerging quantum safe cryptography for 5G
  • Emerging techniques in intelligent transportation systems
  • Emerging network attacks & anomalies detection and prevention
  • Emerging approaches to cybersecurity
  • Emerging techniques in identity management
  • Emerging approaches of smart contract and distributed ledger
  • Emerging blockchain techniques

Paper Submission Guideline

All papers need to be submitted electronically through the website (https://edas.info/N29640) with PDF format. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. A submission is limited to 8 pages for main conference regular papers, 6 pages for workshop papers or short papers in the IEEE Computer Society Proceedings Format with Portable Document Format (.pdf). A submission can have at most 4 additional pages with the pages overlength charge if accepted. Papers must be clearly presented in English, including tables, figures, references and appendices. Papers will be selected based on their originality, significance, relevance, and clarity of presentation assessed by at least three reviewers. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and present the work, with either online or offline presentation. IEEE TrustCom 2022 reserves the right to exclude a paper from distribution after the conference (e.g., removal from the digital library and indexing services), if the paper is not presented at the conference. Accepted and presented papers will be submitted in the IEEE for indexing. Distinguished papers presented at the conference, after further revision, will be published in special issues of high quality international journals. Two or three outstanding papers will be selected to receive the Best Paper Awards.

Sponsors

Copyright© TrustCom-2022. Created and Maintained by TrustCom-2022.