Call for Papers
Full/Short Papers Deadline: November 12th 2018 November 26th 2018
The submission link for EDAS is the following: WIP Papers Deadline: January 7th 2019
The submission link for EDAS is the following:
The conference welcomes contributions addressing (but not limited to) the following topics:
Proximity communication technologies for mobile (NFC, Bluetooth Low Energy, ZibBee,…), secure transactions over proximity communications;
Trust for mobile applications and services, Secure Elements, SIM frameworks; SecureSD, (including Google Vault) platforms; Single Wire Protocol (SWP); Trusted Service Manager (TSM); Secure over the air (OTA) services, Flash over the
air (FOTA)Hardware Secure Module (HSM)
New mobile secure architectures. Host Card Emulation (HCE). Trusted Execution Environment (TEE).
New services and business perspectives New payment applications; Apple Pay, Android Pay, Samsung Pay Services; Crypto Currencies (Bitcoin, Ethereum);
secure tokenisation technologies; proximity communication for access control; automotive industry perspectives; applications for the consumer industry; applications for smart cities; Internet Of Things (IoT) new perspectives;
Mobile Applications for Social Networks.
Deployment experimentsand testing for IoT Platforms, payments, transport, ticketing, access control, couponing, macro localization (Tags).
https://edas.info/newPaper.php?c=25450
https://edas.info/newPaper.php?c=25450&track=94570
We are looking for both research papers on new applications and presentations of deployment experiments or new business opportunities.
This conference aims to bring researchers and industrial experts together to discuss the latest frontiers of mobile technology and also novel applications that have not been thought of before.
In an always-on and everything connected context, mobile applications are more and more interacting with sensitive or personal resources hosted in cloud computing or Internet of Things infrastructure. As a consequence, security and trust are critical issues, and likely a prerequisite for the deployment of IoT frameworks.