In case someone is interested in submitting a paper related to the great work we did in Security 2.0.
---------- Forwarded message ---------- From: <[email protected]<mailto:[email protected]>> Date: Tue, Mar 15, 2016 at 2:04 AM Subject: Call for Papers: Connect Security World - Deadline March 31, 2016 To: [email protected]<mailto:[email protected]> ******************************************************************** Connect Security World Embedding Trust in IoT Systems and Connected Hardware Conference & Exhibition – Sept. 26-28, 2016 – Marseille Provence, France http://www.connectsecurityworld.com/ ******************************************************************** (Apologies for possible cross postings) - Exploring for 5 years the state-of-the-art technologies providing strong security to our connected society, Connect Security World invites the Digital Security community to apply its expertise in trusted mobility and secure transactions to IoT security. Its PROGRAM COMMITTEE www.connectsecurityworld.com/program-committee<http://www.connectsecurityworld.com/program-committee> is selecting 70+ security experts and IoT developers to present and discuss the latest HW/SW trusted technologies, the methods to minimize risks in a security-by-design approach, the lessons from IoT implementations in key Verticals. ******************************************************************** DIRECT LINK TO THE CALL FOR PAPERS: http://www.connectsecurityworld.com/call-for-papers ******************************************************************** The 2016 conference topics will include: TRUSTED TECHNOLOGIES: ·Hardware & embedded software security ·Encryption technology ·Identity of Things ·Secure Cloud of things ·Network security IoT APPLICATIONS SECURITY: ·Critical infrastructures ·Connected Cars ·Smart Home ·Wearables ·e-Health… METHODS & BEST PRACTICES: ·Strategies for end-to-end security ·Security by design ·IoT security analysis and audit ·Privacy, privacy enhancing technologies… IoT ENVIRONMENT: ·Standardization ·Government level initiatives... Full list of topics and submission procedure in the Call for Papers (Deadline: March 31, 2016). This agenda will gather not only the digital security experts but also the IoT developers' community at large, from IoT manufacturing to services providers and implementers in Verticals: all in all, 450 delegates are expected. Within Smart Security Week http://www.smartsecurityweek.com the delegates will also benefit from synergies of contents and networking opportunities with two co-located conferences – Connect Security World, Security Automation World. Altogether Smart Security Week expects 1200 attendees coming from the spearhead organizations in mobile/internet, digital identity and digital security. To unsubscribe, please click on the link below : http://www.strategiestm.com/cgi-bin/en/[email protected]&L=213 -- Brett Preston The Linux Foundation +1 (971) 303-9030<tel:%2B1%20%28971%29%20303-9030> [email protected]<mailto:[email protected]> Google Talk: [email protected]<mailto:[email protected]> Skype: bprestoncf -- Philip Philip DesAutels, PhD Senior Director of IoT The Linux Foundation +1.781.363.3713 skype:philip.desautels
_______________________________________________ Allseen-core mailing list [email protected] https://lists.allseenalliance.org/mailman/listinfo/allseen-core
