The 15th IEEE International Conference on Trust, Security and Privacy
      in Computing and Communications (IEEE TrustCom-16)
23-26 August 2016, Tianjin, China


 Submission Deadline: April 15, 2016
 Authors Notification: May 31, 2016
 Final Manuscript Due: July 1, 2016


With the rapid development and increasing complexity of computer
systems and communication networks, user requirements for trust,
security and privacy are becoming more and more demanding. Therefore,
there is a grand challenge that traditional security technologies and
measures may not meet user requirements in open, dynamic,
heterogeneous, mobile, wireless, and distributed computing
environments. As a result, we need to build systems and networks in
which various applications allow users to enjoy more comprehensive
services while preserving trust, security and privacy at the same
time. As useful and innovative technologies, trusted computing and
communications are attracting researchers with more and more

The 15th IEEE International Conference on Trust, Security and Privacy
in Computing and Communications (IEEE TrustCom-16) will be held in
Tianjin, China on 23-26 August 2016. The conference aims at bringing
together researchers and practitioners in the world working on trusted
computing and communications, with regard to trust, security, privacy,
reliability, dependability, survivability, availability, and fault
tolerance aspects of computer systems and networks, and providing a
forum to present and discuss emerging ideas and trends in this highly
challenging research field.

Topics of interest include, but not limited to

Trust Track
- Trust semantics, metrics and models
- Trusted computing platform
- Trusted network computing
- Trusted operating systems
- Trusted software and applications
- Trust in social networks
- Trust in e-commerce and e-government
- Trust in mobile and wireless communications
- Risk and reputation management
- Survivable computer systems/networks
- Trust of 5G
- Miscellaneous trust issues

Security Track
- Network security
- Computer security
- Database security
- Web applications security
- Security policy, model and architecture
- Security in social networks
- Security in parallel and distributed systems
- Security in mobile and wireless communications
- Security in grid/cloud/pervasive computing
- Authentication, authorization and accounting
- Security of 5G
- Miscellaneous security issues

Privacy Track
- Privacy in Web-based applications and services
- Privacy in database systems
- Privacy in parallel and distributed systems
- Privacy in grid/cloud/pervasive computing
- Privacy in mobile and wireless communications
- Privacy in e-commerce and e-government
- Privacy in network deployment and management
- Privacy and trust
- Privacy and security
- Privacy and anonymity
- Privacy preservation in 5G
- Miscellaneous privacy issues

Forensics Track
- Anti-forensics
- Biometrics
- Cryptanalysis
- Big data forensics
- CCTV forensics
- Cloud forensics
- Computational forensics
- Cyber-physical system forensics
- Datamining for forensics
- Facial recognition
- Fingerprint forensics
- Image forensics
- Malware forensics
- Mobile app forensics (e.g. Skype, WeChat and Facebook)
- Mobile device forensics
- Multimedia forensics
- Network forensics
- Steganography and steganalysis
- System reverse engineering
- Watermarking


Submitted papers must not substantially overlap with papers that have
been published or that are simultaneously submitted to a journal or a
conference with proceedings. Papers must be clearly presented in
English, must not exceed 8 pages, including tables, figures,
references and appendixes, in IEEE Computer Society proceedings format
with Portable Document Format (.pdf). Please submit your paper at

Papers will be selected based on their originality, timeliness,
significance, relevance, and clarity of presentation. Submission of a
paper should be regarded as a commitment that, should the paper be
accepted, at least one of the authors will register and attend the
conference to present the work. Accepted and presented papers will be
included in the IEEE CPS Proceedings. Distinguished papers presented
at the conference, after further revision, will be recommended to high
quality international journals.


General Chairs
 Hai Jin, Huazhong Unievrsity of Science and Technology, China
 Nei Kato, Tohoku University, Japan
 Tharam Dillion, Latrobe University, Australia

Program Chairs
 Yang Xiang, Deakin University, Australia
 Kui Ren, University at Buffalo, USA
 Dengguo Feng, Institute of Software, Chinese Academy of Sciences, China

Program Vice-Chairs
 Kim-Kwang Raymond Choo, University of South Australia, Australia

Trust  Track Chairs
 Jian Weng, Jinan University, China
 Cong Wang, City University of Hong Kong, Hong KongSecurity Track Chairs
 Xinwen Fu, University of Massachusetts Lowell, USA
 Di Ma, University of Michigan-Dearborn, USAPrivacy Track Chairs
 Aziz Mohaisen, Univerisity at Buffalo (SUNY), USA
 Zonghua Zhang, Institute Mines-Telecom/TELECOM Lille, France

Forensics Track Chairs
 Kim-Kwang Raymond Choo, University of South Australia, Australia
 Yong Guan, Iowa State University, USA

Steering Co-Chairs
 Guojun Wang, Central South University, China (Chair)
 Laurence T. Yang, St. Francis Xavier University, Canada (Chair)

Workshop Chairs
 Kaiqi Xiong, University of South Florida, USA

Publicity Chairs
 Sangheon Pack, Korea University, Korea
 Md Zakirul Alam Bhuiyan, Temple University, USA
 Jiageng Chen, Central China Normal University, China

Steering and Program Committees
 Please see http://adnet.tju.edu.cn/TrustCom2016/