The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.
Track 1: Trust Track
(1) Trust semantics, metrics and models
(2) Trusted computing platform
(3) Trusted network computing
(4) Trusted operating systems
(5) Trusted software and applications
(6) Trust in social networks
(7) Trust in e-commerce and e-government
(8) Trust in mobile and wireless communications
(9) Risk and reputation management
(10)Survivable computer systems/networks
(11) Trust in 5G networks
(12) Miscellaneous trust issues in cyber Security
(13) System reverse engineering
(14) Watermarking and security
(15) Cryptanalysis and security solutions
Track 2: Security Track
(1) Network and cyber security
(2) Computer security
(3) Database security
(4) Web applications security
(5) Security policy, model and architecture
(6) Security in social networks
(7) Security in parallel and distributed systems
(8) Security in mobile and wireless communications
(9) Security in cloud/pervasive computing
(10) Authentication, authorization and accounting
(11) Security of 5G Networks
(12) Miscellaneous security issues
(13) Steganography and steganalysis
(14) Security-aware facial recognition
Track 3: Privacy Track
(1) Privacy in web-based applications and services
(2) Privacy in database systems
(3) Privacy in parallel and distributed systems
(4) Privacy in cloud/pervasive computing
(5) Privacy in mobile and wireless communications
(6) Privacy in e-commerce and e-government
(7) Privacy in network deployment and management
(8) Privacy and trust
(9) Privacy and security
(10) Privacy and anonymity
(11) Privacy preservation in 5G
(12) Miscellaneous privacy issues
(13) Privacy-preserving biometrics
Track 4: Forensics and Analytics Track
(1) Anti-forensics and analytics
(2) Big data forensics
(3) CCTV forensics
(4) Cloud forensics
(5) Computational forensics
(6) Cyber-physical system forensics
(7) Datamining for forensics
(8) Fingerprint forensics
(9) Image forensics
(10) Malware forensics
(11) Mobile app forensics (e.g. Skype, WeChat and Facebook)
(12) Mobile device forensics
(13) Multimedia forensics
(14) Network forensics
Track 5: Emerging Tech Track
(1) Emerging hardware security
(2) Emerging security problems and solutions in edge/fog computing
(3) Emerging paradigms of deep learning in security
(4) Emerging applications of reinforcement learning for securing networks
(5) Emerging secure mechanisms for service delivery models
(6) Emerging quantum safe cryptography for 5G
(7) Emerging techniques in intelligent transportation systems
(8) Emerging network attacks & anomalies detection and prevention
(9) Emerging approaches to cybersecurity
(10) Emerging techniques in identity management
(11) Emerging approaches of smart contract and distributed ledger
(12) Emerging blockchain techniques
All papers need to be submitted electronically through the conference website (https://hpcn.exeter.ac.uk/trustcom2021/) with PDF format.
Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference with proceedings.
A submission is limited to 8 pages for main conference regular papers, 6 pages for workshop papers or short papers in the IEEE Computer Society Proceedings Format with Portable Document Format (.pdf).
A submission can have at most 4 additional pages with the pages overlength charge if accepted. Papers must be clearly presented in English, including tables, figures, references and appendices.
Papers will be selected based on their originality, significance, relevance, and clarity of presentation assessed by at least three reviewers.
Submission of a paper should be regarded as a commitment that, should the paper be accepted, at least one of the authors will register and present the work, with either online or offline presentation.
IEEE TrustCom 2021 reserves the right to exclude a paper from distribution after the conference (e.g., removal from the digital library and indexing services), if the paper is not presented at the conference.
Accepted and presented papers will be submitted in the IEEE for indexing.
Distinguished papers presented at the conference, after further revision, will be published in special issues of high quality international journals.
Two or three outstanding papers will be selected to receive the Best Paper Awards.