RFIDsec 2015 will be held from June 23 to June 24, 2015. It will be co-located with ACM WiSec 2015 in New York City, US.
The RFIDSec workshop is the premier international venue on the latest technological advances in security and privacy in Radio Frequency Identification (RFID). The 11th edition of RFIDSec continues the effort to broaden the scope towards solutions for security and privacy in related constrained environments: Internet of Things, NFC devices, Wireless Tags, and more. RFIDSec 2015 will be co-located with WiSec 2015. Attendees from academia, industry and government can network with a broad range of international experts. The workshop will include both invited and contributed talks.
We invite researchers to submit their latest results in Security and Privacy for RFID as well as for associated technologies. Topics of interest include:
- Implementations of cryptography and protocols with constrained resources in terms of energy, power, computation resources and memory footprint
- Lightweight cryptography and cryptographic protocols
- Efficient and secure processor architectures for constrained environments
- Tamper and reverse-engineering resistant designs for constrained platforms
- Side-channel and fault attacks as well as countermeasures
- Novel implementations of cryptography to support privacy and untraceability
- Cross-layer engineering of constrained secure implementations within secure systems
- Novel technologies and applications such as NFC, IC anti-counterfeiting, and Internet of Things
- Design issues related to scalability, large-scale deployment and management of secure tags
Submitted papers should present novel contributions related to the topics listed above. They must be original, unpublished, anonymous and not submitted to another conference or journal for consideration of publication.
Papers must be written in English and they should not exceed 15 pages and be compliant with LNCS template. Appendices that go beyond the limit of 15 pages can be added. However, reviewers are not required to read the appendices and the papers should be intelligible without them. Submissions not meeting these guidelines risk rejection without consideration of their merits.
All submissions will be blind-refereed. Authors are invited to submit their manuscripts (PDF or PS format) by filling in the submission form available on the following web site here.
Submission implies the willingness of at least one of the authors to register and present the paper. The proceedings will be published as a Springer Lecture Notes in Computer Science (LNCS) volume.
- Paper submission: February 24, 2015
February 17, 2015
- Notification to authors: April 7, 2015
- Camera-ready version: April 28, 2015
- Workshop: June 22-23, 2015
Gildas Avoine, UC Louvain, Belgium
Frederik Armknecht, University of Mannheim, Germany
Lejla Batina, Radboud University, The Netherlands
Srdjan Capkun, ETH Zurich, Switzerland
Thomas Eisenbarth, Worcester Polytechnic Institute, USA
Martin Feldhofer, NXP, Austria
Aurelien Francillon, Eurecom, France
Gerhard Hancke, City University of Hong Kong, Hong Kong
Julio Hernandez-Castro, University of Kent, UK
Daniel Holcomb, UMass Amherst, USA
Michael Hutter, Cryptography Research, USA
Stefan Mangard (co-chair), TU Graz, Austria
Daisuke Moriyama, NICT, Japan
Berna Ors, Istanbul Technical University, Turkey
Christof Paar, Ruhr University Bochum, Germany
Axel Poschmann, NXP, Germany
Bart Preneel, KU Leuven, Belgium
Matt Robshaw, Impinj, USA
Kazuo Sakiyama, University of Electro-Communications, Japan
Nitesh Saxena, University of Alabama at Birmingham, USA
Patrick Schaumont (co-chair), Virginia Tech, USA
Rajat Subhra Chakraborty, IIT Kharagpur, India
Erich Wenger, TU Graz, Austria
Avishai Wool, Tel Aviv University, Israel