****IEEE ISSNIP 2013 Workshop on RFID Technology, Applications and Security

*In conjunction with the 8th IEEE International Conference on Intelligent
Sensors, Sensor Networks and Information Processing (ISSNIP), April 2-5,
2013, Melbourne, Australia*


** **

Extended Deadlines

*Abstract Submission Deadline: December 5, 2012 *

*Paper Submission Deadline: December 7, 2012 *

** **

Radio Frequency Identification (RFID) technology enables the non-contact,
automatic and unique identification of objects and people using radio
waves. As the need for auto identification (auto-ID) systems becomes
increasingly common place in many economic sectors, potential RFID
applications include homeland security (RFID enabled passports), e-business
(RFID enabled credit cards), e-cash (RFID enabled bank notes) and automated
supply chain management. It is estimated that the RFID market will be worth
around US$26.9 billion worldwide by 2015. However, there are significant
research challenges that still need to be addressed before the widespread
adoption of RFID systems. 

The main purpose of this workshop is to serve as a forum that brings
together RFID researchers and practitioners from academia, industry and
government to discuss recent developments in RFID systems and technology,
applications and security. This platform will also serve to identify key
research challenges in the design, operation, analysis, practical
application and optimization of RFID systems.

Topics of interest include, but are not limited to:

   - RFID antenna theory and design, channel measurements and modelling
   - RFID software and middleware
   - Coding, anti-collision, and medium access schemes
   - RFID Localisation techniques and algorithms in RFID tag and reader
   - RFID Integration with Sensors  
   - RFID sensor modelling and analysis
   - Privacy preserving techniques
   - Vulnerability and Cryptanalysis
   - Lightweight Cryptography for sensors and RFID 
   - Security Standards, Frameworks and Protocols
   - Security in mobile sensor and RFID systems         
   - Trust management and related frameworks
   - Security policy and management
   - Key management techniques    
   - Specific application contexts with a scientific focus (e.g.,
     healthcare, military, supply chains)

 ** **

*Submission Guidelines:* Prospective authors are invited to submit full
papers (up to 6 pages in length, A4 page only) electronically through the
EDAS system (http://edas.info/13215). Papers must be original material not
currently under review by another conference or journal. All submitted
papers will be subjected to multiple independent peer reviews. Submission
implies the willingness of at least one of the authors to register and
present the paper. All accepted papers will be published by the IEEE Press
and will appear in the Conference Proceedings and on IEEE Xplore.


Abstract Submission Deadline: December 5, 2012

Paper Submission Deadline: December 7, 2012

Paper Acceptance Notification: December 20, 2012

Camera Ready Manuscript: January 10, 2013

* *


Robin Doss, Deakin University, Australia (robin.doss@deakin.edu.au)

Selwyn Piramuthu, University of Florida (selwyn.piramuthu@warrington.ufl.edu

** **

*Technical Programme Committee*

Gildas Avoine, Université catholique de Louvain (UCL), Belgium

Lejla Batina, Radboud University Nijmegen, The Netherlands

Roberto DiPietro, Università di Roma Tre, Italy

John Gan, National RFID Centre, Singapore

Gul N. Khan, Ryerson University, Canada

Albert Levi, Sabanci University, Turkey

Pedro Peris-Lopez, Universidad Carlos III de Madrid, Spain

Chris Mitchell, Royal Holloway, University of London, UK

Xianming Qing, Institute for Infocomm Research, Singapore

David Sundaram, University of Auckland, New Zealand

Wei Zhou, ESCP Europe, France

** **