2nd International Workshop on

Security, Privacy and Trust
in Pervasive and Ubiquitous Computing

June 29, 2006, Lyon, France

In conjunction with the IEEE ICPS'06

Aims and Scope

Submission Info

Program Chairs

Workshop program


List of topics

Important Dates

Program Committee



Download Call For Papers

Aims and Scope

Building a world with surrounding logic promises that humans will be able to leave and interact inspired by constant provision of personalized services. This provision will be enabled through invisible devices that offer distributed computing power and spontaneous connectivity. The nomadic human traversing residential, working, and advertising environments will seamlessly and constantly be served by small mobile devices like portables, handheld or wearable computers. This paradigm of leaving and interacting introduces new security and privacy risks.

Utilizing the results of the 1st International SecPerU2005 Workshop, the objectives of the SecPerU 2006 Workshop are to develop new security, privacy and trust concepts for complex application scenarios based on systems like handhelds, phones, and smart cards with the emerging technology of ubiquitous and pervasive computing

List of topics

We welcome the submission of papers from the full spectrum of issues related with Security, Privacy and Trust in Pervasive and Ubiquitous Computing. Papers may focus on architectures, methods, technologies, protocols, prototype developments, case studies, applications, practical experiences, simulation results and analysis, theory and validation on pervasive and ubiquitous computing topics include, but not limited to:

  • Reasoning about Security, Privacy and Trust
  • Access control and authorization
  • Key management and authentication
  • Identity management
  • Authorization and information flow
  • Denial of service attacks
  • Intrusion detection and protection systems
  • Privacy, anonymity, pseudonymity, and unlinkability
  • Location privacy and secure localization
  • Network security issues and protocols
  • Information hiding and watermarking
  • Trust and reputation management
  • Game theory and incentives for cooperation enforcement
  • Role of RFID, sensors and biometrics to enable security
  • Developing security policies
  • Developing secure infrastructures
  • Auditing and forensic information management in pervasive settings
  • Case Studies
  • Paper Submission and Proceedings

    Authors are invited to submit original manuscripts, which should be written in English and with a very precise and concise presentation of no more than 6 pages in IEEE double-column format. Reviewers are not required to read the appendices and the paper should be intelligible without them. Authors are invited to send their manuscripts as an attachment (PDF/PS format) by email to the Workshop Chairs at: spu2006 [at] . Submission implies the willingness of at least one of the authors to register and present the paper. The 2nd SecPerU 2006 Workshop Proceedings will be published by the IEEE Computer Society Press , and distributed at the Workshop.

    Important Dates

  • Submission of papers: Febr. 03, 2006 Febr. 13, 2006
  • Notification of acceptance: March 10, 2006
  • Camera-ready version of papers: April 14, 2006
  • Author's early registration: April 18, 2006
  • Early registration deadilne: May 22, 2006
  • Workshop date: June 29, 2006
  • Program Chairs

    General co-Chairs

    Panagiotis Georgiadis, University of Athens, Greece (georgiad [at]
    Javier Lopez, University of Malaga, Spain (jlm [at]

    Program co-Chairs

    Stefanos Gritzalis, University of the Aegean, Greece (sgritz [at]
    Giannis Marias, University of Athens, Greece (marias [at]

    Technical Program Committee

    G.-J. Ahn, UNC Charlotte, USA
    V. Atluri, Rutgers University, USA
    J. S. Baras, University of Maryland. USA
    M. Burmester, Florida State University, USA
    S. De Capitani di Vimercati, University of Milan, Italy
    J. Clark, Univ. of York, U.K.
    M. Cremonini, University of Milan, Italy
    B. Crispo, Vrije Universiteit, The Netherlands
    C. Douligeris, University of Piraeus, Greece
    S. Eidenbenz, Los Alamos National Laboratory, USA
    D. Gollmann, TU Hamburg-Harburg, Germany
    S. Hadjiefthymiades, University of Athens, Greece
    D. Hutter, DFKI, Germany
    P. Karger, IBM Watson Research, USA
    T. Karygiannis, NIST, USA
    S. Katsikas, University of the Aegean, Greece
    C. Lambrinoudakis, University of the Aegean, Greece
    B. de Medeiros, Florida State University, USA
    M. Merabti, Liverpool John Moores University, UK
    R. Lee, Princeton University, USA
    C. Mitchell, Royal Holloway, U.K.
    E. Okamoto, University of Tsukuba, Japan
    P. Papadimitratos, EPFL, Switzerland
    G. Polyzos, Athens University of Economics and Business, Greece
    N. Prasad, Aalborg University, Denmark
    R. Roman, University of Malaga, Spain
    J-M Seigneur, University of Geneva, Swiss
    D. Serpanos, University of Patras, Greece
    S. Seys, Katholieke Univ. Leuven, Belgium
    M. Singhal, University of Kentucky, USA
    G. Stamoulis, , Athens University of Economics and Business, Greece
    A. Yasinsac, Florida State University, USA
    J. Zhou, Institute for Infocomm Research, Singapore

    Accepted Papers and Preliminary Workshop Program

    08h45 - 09h00 : Opening

    09h00 - 10h00 : Session 1

    S. Balfe, S. Li, and J. Zhou. Pervasive Trusted Computing
    A. Karygiannis, E. Antonakakis, and A. Apostolopoulos. Detecting Critical Nodes for MANET Intrusion Detection Systems
    E. Hooper. An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDS

    10h00 - 10h30 : Coffee break

    10h30 - 12h00 : Session 2

    D. Henrici, et al. A hash-based Pseudonymization Infrastructure for RFID Systems
    J. Bringer, H. Chabanne, and E. Dottax. HB++: a Lightweight Authentication Protocol Secure against Some Attacks
    V. Casola, L. Coppolino, A. Mazzeo, N. Mazzocca, and M. Rak. Design and implementation of TruMan, a Trust Manager Component for Distributed Systems
    L. Kazatzopoulos C. Delakouridis G. F. Marias, and P. Georgiadis. iHIDE: Hiding Sources of Information in WSNs

    12h00 - 13h30 : Lunch

    13h30 - 15h00 : Session 3

    Fabio Ricciato, Philipp Svoboday, Eduard Hasenleithner and Wolfgang Fleischer. On the Impact of Unwanted Traffic onto a 3G Network
    J. Lopez, J. A. Montenegro, and R. Roman. Securing Critical Information Infrastructures
    K. Imamoto, and K. Sakurai. Enhanced Privacy in Key-Exchange Protocols by One-time ID
    V. G. Bintzios, T. G. Papaioannou, and G. D. Stamoulis. An effective approach for accurate estimation of trust of distant information sources in the Semantic Web

    15h00 - 15h30 : Coffee break

    15h30 - 16h30 : Session 4

    Z. Yan. A Conceptual Architecture of a Trusted Mobile Environment
    B. Groza. Using one-way chains to provide authenticity without shared secrets
    M. Markovic, and G. Dordevic. On Optimizing Standard Asymmetric and Symmetric Cryptographic Algorithm Implementation on TI Signal Processors
    16h30 : Closing


    Registration is open, refer to ICPS'06 web site
    Registration fees: 300Euro (+30Euro after May, 22nd)
    Extra page fees: 100Euro/page (applies to authors only)


    The SecPerU2006 Workshop will be located in Mercure Grand Hotel Saxe Lafayette in the city center of Lyon, France.
    To find hotel information refer to ICPS'06 web site

    Konstantinos Papapanagiotou (conpap [at]