In case someone is interested in submitting a paper related to the great work 
we did in Security 2.0.

---------- Forwarded message ----------
From: <[email protected]<mailto:[email protected]>>
Date: Tue, Mar 15, 2016 at 2:04 AM
Subject: Call for Papers: Connect Security World - Deadline March 31, 2016
To: [email protected]<mailto:[email protected]>



********************************************************************
Connect Security World
Embedding Trust in IoT Systems and Connected Hardware

Conference & Exhibition – Sept. 26-28, 2016 – Marseille Provence, France
http://www.connectsecurityworld.com/
********************************************************************
(Apologies for possible cross postings)  -

Exploring for 5 years the state-of-the-art technologies providing strong 
security to our connected society, Connect Security World invites the Digital 
Security community to apply its expertise in trusted mobility and secure 
transactions to IoT security.

Its PROGRAM COMMITTEE 
www.connectsecurityworld.com/program-committee<http://www.connectsecurityworld.com/program-committee>
 is selecting 70+ security experts and IoT developers to present and discuss 
the latest HW/SW trusted technologies, the methods to minimize risks in a 
security-by-design approach, the lessons from IoT implementations in key 
Verticals.
********************************************************************
DIRECT LINK TO THE CALL FOR PAPERS:
http://www.connectsecurityworld.com/call-for-papers

********************************************************************
The 2016 conference topics will include:

TRUSTED TECHNOLOGIES: ·Hardware & embedded software security ·Encryption 
technology ·Identity of Things ·Secure Cloud of things ·Network security

IoT APPLICATIONS SECURITY: ·Critical infrastructures ·Connected Cars ·Smart 
Home ·Wearables ·e-Health…

METHODS & BEST PRACTICES: ·Strategies for end-to-end security ·Security by 
design ·IoT security analysis and audit ·Privacy, privacy enhancing 
technologies…

IoT ENVIRONMENT: ·Standardization ·Government level initiatives...

Full list of topics and submission procedure in the Call for Papers (Deadline: 
March 31, 2016).

This agenda will gather not only the digital security experts but also the IoT 
developers' community at large, from IoT manufacturing to services providers 
and implementers in Verticals: all in all, 450 delegates are expected.
Within Smart Security Week http://www.smartsecurityweek.com
the delegates will also benefit from synergies of contents and networking 
opportunities with two co-located conferences – Connect Security World, 
Security Automation World.
Altogether Smart Security Week expects 1200 attendees coming from the spearhead 
organizations in mobile/internet, digital identity and digital security.




To unsubscribe, please click on the link below :
http://www.strategiestm.com/cgi-bin/en/[email protected]&L=213



--
Brett Preston
The Linux Foundation
+1 (971) 303-9030<tel:%2B1%20%28971%29%20303-9030>
[email protected]<mailto:[email protected]>

Google Talk: [email protected]<mailto:[email protected]>
Skype: bprestoncf



--
Philip

Philip DesAutels, PhD
Senior Director of IoT
The Linux Foundation
+1.781.363.3713   skype:philip.desautels
_______________________________________________
Allseen-core mailing list
[email protected]
https://lists.allseenalliance.org/mailman/listinfo/allseen-core

Reply via email to