Conference Information
PRISMS 2014: International Conference on Privacy and Security in Mobile Systems
Submission Date:
Notification Date:
Conference Date:
Aalborg, Denmark
Viewed: 7714   Tracked: 0   Attend: 0

Call For Papers
PRISMS' focus is the convergence of information and communication technology in mobile scenarios. This convergence is realised in intelligent mobile devices, accompanied by the increasing importance of heterogeneous access networks networks such as 3G, 4G, LTE, WiFi, PAN, NFC, etc. Privacy and security aspects need to be covered at all layers of mobile communication, from devices, over privacy-respecting credentials and mobile identity management, to machine-to-machine communications. In particular, mobile devices such as Smartphones and Internet Tablets have been very successful in commercialization. However, their security mechanisms are not always able to deal with the growing threat of attacks. As mobile communication and information processing becomes a commodity, economy and society requires protection of this precious resource. Mobility and trust in networking go hand in hand for future generations of users, who need privacy and security at all layers of technology. In addition, the introduction of new data collection practices and data-flows (e.g. sensing data) from mobile devices makes it more difficult to understand the new security and privacy threats introduced. PRISMS strives to bring together the leading-edge of academia and industry in mobile systems security, as well as practitioners, standards developers and policymakers. Contributions may range from architecture designs and implementations to cryptographic solutions for mobile and resource-constrained devices.


Technical papers describing original, previously unpublished research, not currently under review by another conference or journal, are solicited. PRISMS solicits original, high-quality research contributions in the form of full papers. The focus is on the security of information and communication systems including mobile networks, devices and applications. Papers from other areas, e.g., formal methods, cryptography, database security, operating system security, will be considered if a clear connection to one of the topics below is demonstrated. Topics of interest include, but are not limited to the following focus areas:

Privacy and Security in Emerging Mobile Applications and Services

    Privacy-respecting Authentication
    Mobile Identity Management
    Mobile Wallets, Mobile Payments
    Location-based Services and Mobile Sensing
    Security of private devices in corporate environments, Bring Your Own Device (BYOD)

Machine-to-Machine Security

    Device Identities and Authentication
    M2M Security Architectures and Standardisation
    Remote Security Management, Verification, and Remediation of M2M Devices
    Privacy & Security for the Internet of Things (IoTs)

User Device Security and Privacy

    Advanced Security & Privacy Mechanisms
    Trusted Execution Environments (TEE) and their applications
    Rogue Mobile Application Detection and Protection
    Secure Elements and Tokens
    Forensic Analysis 
    Security in Home Automation and Smart Home

Proposals for panels/demos/workshops/tutorials are solicited. Potential organisers are welcome to submit a proposal to one of the General Chairs. 

Posters, containing timely work which encourages graphical presentation, demonstration and active engagement participants will be presented at the conference in a dedicated session. Proposals for posters should must be submitted as abstracts not exceeding 2 pages in the conference‘s paper format, by April 10, 2014 (extended).  

The posters themselves have no predefined formatting, but dimensions may not exceed A1 paper size (841mm x 594mm / 33.1" x 23.4"), portrait format. Authors are encouraged to include a draft or sketch of the poster layout and content in their submission to help reviewers and show that the poster format is being used effectively. Those who intend to show demos are also highly encouraged to submit an accompanying video or other supplementary materials. Abstracts should include a concise description of the idea, the results or findings, supporting imagery and figures, and a discussion of the implications of the work to the selected domain. Full literature searches are not expected, although relevant citations should be included.

Papers must be formatted as PDF files and be submitted only through the EDAS Conference and Journal Management System. Full papers must not exceed the limit of 8 pages,  short papers limit is 4 pages, including text, figures and references. The font size must be at least 10 points.It is mandatory to use the standard IEEE templates for preparing your manuscripts. Standard IEEE templates for Microsoft Word or LaTeX formats can be found at IEEE Manuscript Templates for Conference. Accepted papers will be published in the PRISMS Conference Proceedings and IEEE XPLORE. Selected high-quality papers will be invited to a Special Issue in the Journal Wireless Personal Communications (Springer).

Paper Anonymity

All submitted papers will be judged based on their quality and relevance through double-blind reviewing, where the identities of the authors are withheld from the reviewers. As an author, you are required to make a good-faith effort to preserve the anonymity of your submission, while at the same time allowing the reader to fully grasp the context of related past work, including your own. Common sense and careful writing will go a long way towards preserving anonymity. Minimally, please take the following steps when preparing your submission:

1) Remove the names and affiliations of authors from the title page.
2) Remove acknowledgment of identifying names and funding sources.
3) Use care in naming your files. Source file names (e.g., "Alice-n-Bob.dvi") are often embedded in the final output as readily accessible comments.
4) Use care in referring to related work, particularly your own. 
5) Do not omit references to provide anonymity, as this leaves the reviewer unable to grasp the context. Instead, reference your past work in the third person, just as you would any other piece of related work by another author.
Last updated by Dou Sun in 2014-02-02
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
b1ICEC'International Conference on Electronic Commerce2013-03-162013-04-242013-08-13
ICCEEInternational Conference on Computer and Electrical Engineering2022-02-252022-03-202022-06-24
CIAInternational Conference on Computer, Information and Application2016-03-302016-04-152016-05-19
ab1ICARCVInternational Conference on Control, Automation, Robotics and Vision2022-06-152022-09-012022-12-11
ASSRIAustralasian Symposium on Service Research and Innovation2018-11-152018-12-072018-12-14
ICECTInternational Conference on Electronics Communication Technologies2020-06-152020-07-052020-10-09
ab1ISMMInternational Symposium on Memory Management2021-03-112021-04-232021-06-22
ICIII'International Conference on Industrial and Intelligent Information2015-03-052015-03-302015-05-18
MOBILWAREInternational Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications2020-02-202020-03-312020-07-10
ICESEE'International Conference on Environmental Science and Energy Engineering2017-01-05 2017-01-15
Related Journals
CCFFull NameImpact FactorPublisherISSN
IET Circuits, Devices & Systems0.521IET1751-858X
International Journal of Pattern Recognition & Artificial Intelligence World Scientific0218-0014
cFuzzy Sets and Systems3.343Elsevier0165-0114
International Journal of Computer Mathematics1.196Taylor & Francis0020-7160
Journal of Combinatorial Theory, Series B1.317Elsevier0095-8956
aACM Transactions on Database Systems ACM0362-5915
cDecision Support Systems6.969Elsevier0167-9236
IEEE Transactions on Cognitive and Developmental Systems2.755IEEE2379-8920
Telecommunication Systems2.314Springer1018-4864
Journal of Pragmatics1.476Elsevier0378-2166