征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

This edition of Intricate-Sec is centered on Resource Constrained Computing. Computing under resource constraints is a relatively new field in computer science, in which we seek to develop solutions that are viable in terms of performance. Application examples emerge in rural/remote developing world regions where access to computational resources and in-house human capital (in terms of specialised expertise) is impeded for economic reasons. In such cases, it makes sense to seek cost-effective alternatives to deploying Internet services.

Typical solution models rely on mobile phones, and lossy communication networks as a cost effective approach to service delivery. Using a trusted centralised framework for service delivery is not always feasible in these cases, and so distributed management offers a viable alternative. Distributed management however, raises concerns centered around subversion whereby in contrast to standard adversarial models, the malicious party seeks to mask attacks as faults with the goal of gaining some advantage without necessarily provoking a breakdown of the communication network. While seemingly harmless on initial level, when conducted over an extended period and by multiple parties, such attacks can result in unreliable and untrustworthy performance.

征稿信息

重要日期

2017-12-03
摘要截稿日期
2017-12-15
初稿截稿日期
2018-01-25
初稿录用日期
2018-02-16
终稿截稿日期

征稿范围

Topics include, but are not limited to the following:

  • Authentication and Authorization for RCC Systems

  • Anonymity on RCC Systems

  • Applications of Cryptography to RCC Systems

  • Combating Fake News, Phishing, Spoofing, and Spam in RCC Systems

  • Distributed Denial of Service in RCC Networks

  • Fault Tolerance on RCC Networks

  • Identity Management Models on RCC Networks

  • Intrusion Detection and Response on RCC Networks

  • Studies/Experiences on Social Media and Micro-targeting on RCC Networks

  • Studies/Experiences on Social Media and Fake News on RCC Networks

  • Privacy Enhancing Methodologies for RCC Systems

  • Privacy Preserving Data Publishing on RCC Networks

  • Privacy Preserving Data Analytics on RCC Systems

  • Pseudonymity on RCC Systems

  • Tracking and Profiling on RCC Networks

  • Trust Management Models for RCC Systems

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    05月16日

    2018

    05月18日

    2018

  • 12月03日 2017

    摘要截稿日期

  • 12月15日 2017

    初稿截稿日期

  • 01月25日 2018

    初稿录用通知日期

  • 02月16日 2018

    终稿截稿日期

  • 05月18日 2018

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询