
ICPST 2021: 15. International Conference on Privacy, Security and Trust
- 会议时间:2021-04-15 至 2021-04-16
- 会议地点: Cape Town, South Africa,San Francisco,United States 周边酒店预订
发票类型:
不支持开票
参会凭证:其它
Participation Type | Early Registration Fees | Registration Fees |
---|---|---|
Non-Student Oral/Poster Presenter Registration | € 350 | € 400 |
Student Oral/Poster Presenter Registration | € 300 | € 350 |
Listener Registration | € 250 | € 300 |
Additional Paper Publication | € 100 |
The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations. With its high quality, it provides an exceptional value for students, academics and industry researchers.
ICPST 2021: 15. International Conference on Privacy, Security and Trust aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Privacy, Security and Trust. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Privacy, Security and Trust
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters. Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or theoretical work in all areas of Privacy, Security and Trust are cordially invited for presentation at the conference. The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers. Downloadable versions of the check list for Full-Text Papers and Abstract Papers.
Please refer to the Paper Submission Guideline, Abstract Submission Guideline and Author Information before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers. The peer-reviewed conference proceedings are indexed in the Open Science Index, Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, and other index databases. Impact Factor Indicators.
Special Journal Issues
ICPST 2021 has teamed up with the Special Journal Issue on Privacy, Security and Trust. A number of selected high-impact full text papers will also be considered for the special journal issues. All submitted papers will have the opportunity to be considered for this Special Journal Issue. The paper selection will be carried out during the peer review process as well as at the conference presentation stage. Submitted papers must not be under consideration by any other journal or publication. The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly. Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor. To participate as a sponsor or exhibitor, please download and complete the Conference Sponsorship Request Form.
Application Forms
Selected Papers
- Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training
Shaila Rana, Wasim Alhamdani - A Secure Auditing Framework for Load Balancing in Cloud Environment
R. Geetha, T. Padmavathy - Malicious Vehicle Detection Using Monitoring Algorithm in Vehicular Adhoc Networks
S. Padmapriya - A Socio-Technical Approach to Cyber-Risk Assessment
Kitty Kioskli, Nineta Polemi - Keyloggers Prevention with Time-Sensitive Obfuscation
Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee - Computational Approaches for Ballistic Impact Response of Stainless Steel 304
A. Mostafa - Influence of Security on Fan Attendance during Nigeria Professional Football League Matches
B. O. Diyaolu - Authentication of Physical Objects with Dot-Based 2D Code
Michał Glet, Kamil Kaczyński - Leveraging Li-Fi to Enhance Security and Performance of Medical Devices
Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman - A Machine Learning Based Framework for Education Levelling in Multicultural Countries: UAE as a Case Study
Shatha Ghareeb, Rawaa Al-Jumeily, Thar Baker - Secure Socket Layer in the Network and Web Security
Roza Dastres, Mohsen Soori - Judicial Review of Indonesia's Position as the First Archipelagic State to implement the Traffic Separation Scheme to Establish Maritime Safety and Security
Rosmini Yanti, Safira Aviolita, Marsetio - Reduction of Energy Consumption Using Smart Home Techniques in the Household Sector
Ahmed Al-Adaileh, Souheil Khaddaj - Decentralised Edge Authentication in the Industrial Enterprise IoT Space
C. P. Autry, A.W. Roscoe - Spatial-Temporal Awareness Approach for Extensive Re-Identification
Tyng-Rong Roan, Fuji Foo, Wenwey Hseush
Angelo Buhle Dube | University of the Western Cape, ZA |
Ernest Nene Khalema | Human Sciences research Council and The university of KwaZulu-Natal, ZA |
Loraine Boitumelo "Tumi" Mzini | North-West University, South Africa, ZA |
Namukolo Covic | North-West University, ZA |
Armstrong Kadyamatimba | University of Venda, ZA |
Olaleye Matthew Oluwaleye | Leap College, ZA |
Sheikh Shamim Hasnain | Anglia Ruskin University, UK |
Ali Al-Sherbaz | The University of Northampton, UK |
Elhadj Benkhelifa | Staffordshire University, UK |
Mohammed Rezaul Karim | Guildhall College, UK |
Poonam Dharam | Saginaw Valley State University, US |
Rajasekhar Chaganti | University of Texas at San Antonio, US |
Douglas Kelly | Johns Hopkins University Applied Physics Laboratory, US |
Vahid Heydari | Rowan University, US |
Dennis Jjuuko | University of Massachusetts Boston, US |
Pat Nelson | Minnesota State University Mankato, US |
Jessy Abouarab | Florida International University, US |
Nalanda Roy | Georgia Southern University, US |
Marian Leerburger | US Government, US |
Cong Wang | University of North Carolina at Chapel Hill, US |
Harvey Hyman | Saint Leo University, US |
Shalva Marjanishvili | Hinman Consulting Engineers, Inc, US |
Shashank Shanbhag | Salesforce, US |
Yizhen Liu | Research Institue of Huawei at U.S., US |
Rajdeep Bhowmik | Cisco Systems Inc., US |
James Nelson | New Mexico State University, US |
Apurva Mohan | Honeywell Research Labs, US |
Ping Wang | University of Maryland University College, US |
Maurice Dawson | Alabama A&M University, US |
Ronald Gonzales | National University, US |
Abstracts/Full-Text Paper Submission Deadline | January 28, 2021 | |
Notification of Acceptance/Rejection | February 11, 2021 | |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline | March 16, 2021 | |
Conference Dates | April 15-16, 2021 |
- ICMII 2021: 15. International Conference on Medical Immunology and Infection
- ICHII 2021: 15. International Conference on Health Insurance and Interventions
- ICMVDM 2021: 15. International Conference on Mechatronic Vehicles and Design Methodology
- International Conference on Natural Science and Environment