The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2019)

5-8 August 2019

Rotorua, New Zealand

Call for Papers

In a fast-growing cyber security threat landscape, game-changing techniques in information security, trust, privacy and forensics are required for a sustainable future. The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-19) will be held at Rotorua, New Zealand on 5-8 August 2019.

As a leading international conference in the area of trust, information security and privacy, and forensics, the IEEE TrustCom 2019 conference aims to bring together international researchers and practitioners working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks – providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.

Important Dates

  • Submission deadline: February 28, 2019
  • Authors notification: April 27, 2019
  • Camera-Ready Manuscript due: May 27, 2019

Topics of interest

Trust Track

  • Hardware for chains and roots of trust
  • Novel techniques in provenance
  • Provenance for trust
  • Risk and reputation management
  • Software trustworthiness and quality
  • Survivable computer systems/networks
  • Trust in 5G networks
  • Trust in automotive environments
  • Trust in e-commerce and e-government
  • Trust in social networks
  • Trust in mobile and wireless communications
  • Trust semantics, metrics and models
  • Trust visualization
  • Trusted computing platform
  • Trusted network computing
  • Trusted operating systems
  • Trusted software and applications

Security Track

  • Authentication, authorization and accounting
  • Computer security
  • Consumer/User-centric security
  • Database security
  • Emerging topics in information security and applied cryptography
  • Emerging topics in security attributions
  • Fault attacks
  • Hardware security
  • Machine learning applied to security applications
  • Miscellaneous security issues
  • Network security
  • Obfuscation and reverse engineering
  • Provenance for security
  • Security in social networks
  • Security in parallel and distributed systems
  • Security in mobile and wireless communications
  • Security in grid/cloud/pervasive/fog/edge computing
  • Security of 5G
  • Security policy, model and architecture
  • Side-Channel attacks
  • Web applications security

Privacy Track

  • Consumer/User-centric privacy
  • Miscellaneous privacy issue
  • Privacy and anonymity
  • Privacy and policy conformance (GDPR, HIPPA, etc.)
  • Privacy and security
  • Privacy and trust
  • Privacy in database systems
  • Privacy in grid/cloud/pervasive computing
  • Privacy in e-commerce and e-government
  • Privacy in mobile and wireless communications
  • Privacy in network deployment and management
  • Privacy in parallel and distributed systems
  • Privacy in surveillance systems
  • Privacy in Web-based applications and services
  • Privacy preservation in 5G

Forensics and Analytics Track

  • Anti-forensics
  • Automotive Forensics
  • Behavioural biometrics
  • Big data forensics
  • Biometrics
  • CCTV forensics
  • Cloud forensics
  • Computational forensics
  • Cryptanalysis
  • Cyber-physical system forensics
  • Data Mining for forensics
  • Facial recognition
  • Fingerprint forensics
  • Image forensics
  • Malware forensics
  • Mobile app forensics (e.g. Skype, WeChat and Facebook)
  • Mobile device forensics
  • Multimedia forensics
  • Network forensics
  • Steganography and steganalysis
  • System reverse engineering
  • Watermarking

Emerging Technologies

  • Attacks in blockchain / cryptocurrency
  • Blockchain security and privacy
  • Blockchain implementation
  • Blockchain consensus
  • Blockchain based IoT security solutions
  • Blockchain in cyber physical systems
  • Blockchain in social networking
  •  Cryptocurrencies security and privacy
  • Cyber insurance technologies
  • Directed Acyclic Graph (DAG) distributed ledger
  • Emerging and disruptive technologies for security, privacy, trust and forensics
  • Implementations of post-quantum cryptosystems
  • Industry Control systems
  • IoT security and privacy
  • IoT implementations for security and privacy
  • Post-quantum cryptography
  • Security models for the post-quantum era
  • Smart contract

Paper Submission

Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings. Papers must be clearly presented in English, must not exceed 8 pages, including tables, figures, references and appendixes, in IEEE Computer Society proceedings format with Portable Document Format (.pdf). Submission Link

Papers will be selected based on their originality, timeliness, significance, relevance, and clarity of presentation. Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and attend the conference to present the work. Accepted and presented papers will be included in the IEEE CPS Proceedings. Distinguished papers presented at the conference, after further revision, will be recommended to high quality international journals.

Organising Committee

General Chairs

  • Liqun Chen, University of Surrey, United Kingdom
  • Ryan Ko, University of Waikato, New Zealand
  • Liming Zhu, Data61, CSIRO, Australia

Steering Chairs

  • Guojun Wang,  Guangzhou University, China
  • Laurence T. Yang, St. Francis Xavier University, Canada

Steering Committee

  • Jiannong Cao, Hong Kong Polytechnic University, Hong Kong
  • Hsiao-Hwa Chen, National Cheng Kung University, Taiwan
  • Jinjun Chen, Swinburne University of Technology, Australia
  • Kim-kwang Raymond Choo, University Texas San Antonio, USA
  • Minyi Guo, Shanghai Jiao Tong University, China
  • Weijia Jia, Macau University, Macau
  • Jie Li, University of Tsukuba, Japan
  • Jianhua Ma, Hosei University, Japan
  • Gregorio Martinez, University of Murcia, Spain
  • Peter Mueller, IBM Zurich Research Laboratory, Switzerland
  • Maria S. Perez-Hernandez, Universidad Politecnica de Madrid, Spain
  • Indrakshi Ray, Colorado State University, USA
  • Srinivas Sampalli, Dalhousie University, Canada
  • Kouichi Sakurai, Kyushu University, Japan
  • Bhavani Thuraisingham, The University of Texas at Dallas, USA
  • Jie Wu, Temple University, USA
  • Wanlei Zhou, University of Technology, Sydney, Australia

Program Chairs

  • Ramaswamy Chandramouli, NIST, USA
  • Surya Nepal, Data61, CSIRO, Australia
  • Willy Susilo, University of Wollongong, Australia
  • Yang Xiang, Swinburne University of Technology, Australia

Trust Track Chairs

  • Michael Hobbs, Deakin University, Australia
  • Sheikh Mahbub Habib, Continental AG, Germany
  • Priyadarsi Nanda, University of Technology Sydney, Australia
  • Christian Probst, Unitec, New Zealand

Security Track Chairs

  • Raja Naeem Akram, Royal Holloway University of London, United Kingdom
  • Mike Johnstone, Edith Cowan University, Australia
  • Dongseong Kim, University of Canterbury, New Zealand
  • Jonathan Oliver, Trend Micro, Australia
  • Axel Poschmann, DarkMatter, UAE

Privacy Track Chairs

  • Ken Barker, University of Calgary, Canada
  • Shujie Cui, Imperial College, United Kingdom
  • Vimal Kumar, University of Waikato, New Zealand
  • Leonardo Martucci, Karlstad University, Sweden

Forensics and Analytics Track Chairs

  • Jill Slay AM, La Trobe University, Australia
  • Julian Jang-Jaccard, Massey University, New Zealand
  • Zhou Su, Xi’an Jiaotong University, China
  • Ban Tao, NICT, Japan

Emerging Technologies Track Chairs

  • Joseph Liu, Monash University, Australia
  • Rongxing Lu, University of New Brunswick, Canada
  • Ian Welch, Victoria University of Wellington, New Zealand

Journal Special Issue Chairs

  • Ruili Wang, Massey University, New Zealand
  • Yulei Wu, University of Exeter, United Kingdom

Workshop and Tutorial Chair

  • Panos Patros, University of Waikato, New Zealand

Web Chairs

  • Aleksey Ladur, University of Waikato, New Zealand
  • Harpreet Kaur, University of Waikato, New Zealand

Publicity Chairs

  • Brian Cusack, AUT, New Zealand
  • Sabu M Thampi, IITMK, India
  • Md Zakirul Alam Bhuiyan, Fordham University, USA

Publication and Finance Chairs

  • TJ Choi, University of Waikato, New Zealand
  • Abigail Koay, University of Waikato, New Zealand

Logistics Chairs

  • Paula Armstrong, ForumPoint2, Australia/New Zealand
  • Tania Robinson, University of Waikato, New Zealand