Technical Tracks

Track 5: Security, Privacy, Trust, and Incentives (SPTI)
Track Co-Chairs:
Alireza Jolfaei, Macquarie University, Australia, alireza.jolfaei@mq.edu.au
Yingfei Dong, University of Hawaii at Manoa, USA, yingfei@hawaii.edu

Description:
The universal network connectivity and the rapid growth of Internet applications (such as broadband mobile networks, Cloud/Edge computing, and Internet of Things) have made our society more and more depending on connected networks and applications. However, how to enforce security, privacy and trust in these systems has become one of the most critical issues we are facing. Although we already have many amazing solutions, new methods and new algorithms are needed for enforcing security and trust, preserving user and system privacy, and encouraging better and stronger practices with strong incentives. The Security, Privacy, Trust, and Incentives (SPTI) track of the 30th International Conference on Computer Communications and Networks (ICCCN) welcomes submissions of original research papers from academic and practitioners on security, privacy, trusted systems, and incentive mechanisms, which show novel contributions on algorithms, system designs, implementations, and evaluations. We welcome papers in the following areas and other related areas.

Track Topics:
  • Anonymous Communication and Applications
  • Blockchain and Decentralized Trust Management
  • Confidential Computing and Next Frontiers in Security
  • Cloud Security and Privacy
  • Computer Network Security and Privacy
  • Computer and Network Forensics
  • Cyber Threat Intelligence
  • Data Security and Multiparty Access Control in Edge Computing
  • Intelligent Forensics Tools, Techniques and Procedures
  • Incentives and Game Theory
  • Optimization of Utility-Privacy Tradeoffs
  • Security Driven Configuration Management
  • Security, Privacy, and Trust for Cyber-Physical Systems
  • Security, Privacy, and Trust for Networked Control Systems
  • Security, Privacy, and Trust for Resource-Constrained Devices
  • Security, Privacy, and Trust for Wireless Networks
  • Hardware security and Secure Execution Environments
  • Penetration Testing and Network Security
  • Private Information Retrieval
  • Privacy-Preserving Data Aggregation
  • Privacy-Preserving Trust Management
  • Trust and Reputation Models
  • Usable Security and Privacy
  • Vulnerability, Exploitation Tools, and Virus/Worm Analysis
TPC List:
  • Mohammad Sayad Haghighi, Tehran University, Iran
  • Gautam Srivastava, Brandon University, Canada
  • Jerry Chun-Wei Lin, Western Norway University of Applied Sciences, Norway
  • Sheng Wen, Swinburne University of Technology, Australia
  • Joarder Kamruzzaman, Federation University, Australia
  • Amin Sakzad, Monash University, Australia
  • Vinay Chamola, Birla Institute of Technology and Sciences, India
  • Xin-Wen Wu, University of Mary Washington, USA
  • Muhammad Usman, University of South Wales, UK
  • Chen Lv, Nanyang Technological University, Singapore
  • Shantanu Pal, Queensland University of Technology, Australia
  • Kapal Dev, Munster Technological University, Ireland
  • Charalambos Konstantinou, King Abdullah University of Science and Technology, Saudi Arabia
  • Mainak Adhikari, IIIT Lucknow, India
  • Nazeeruddin Mohammad, Prince Mohammad Bin Fahd University, Saudi Arabia
  • James Zheng, Macquarie University, Australia
  • Shahid Mumtaz, Instituto de Telecomunicações Aveiro, Portugal
  • Wei Wei, Xi’an University of Technology, China
  • Weiping Ding, Nantong University, China
  • Ali Kashif Bashir, Manchester Metropolitan University, United Kingdom
  • Mamoun Alazab, Charles Darwin University, Australia
  • Pouya Ostovari, San Jose State University, USA
  • Faezeh Farivar, IAU, Science and Research Branch, Iran
  • Fatemeh Rezaeibagha, Murdoch University, Australia
  • Sejun Song, University of Missouri-Kansas City, USA
  • Zhenhai Duan, Florida State University, USA
  • Danda B. Rawat, Howard University, USA
  • Wenxin Chen, University of Hawaii, USA
  • Yibo Xue, Tsinghua University, China
  • Chuanyi Liu, Harbin Institute of Techonology, China
  • Xi Zhang, Beijing University of Posts and Telecommunications, China
  • Baek-Young Choi, University of Missouri-Kansas City, USA
  • Chunlu Wang, Beijing University of Posts and Telecommunications, China