PerSec 2007

Statue of Liberty Fourth IEEE International Workshop on Pervasive Computing and Communication Security
Held in conjunction with IEEE PerCom 2007
19 March 2007, New York, USA

Call for Papers - Instructions for Authors - Important dates - Program Committee - Previous workshops | Logistics - Registration | Workshop Programme

Related workshop

If you are interested in PerSec, you will probably also be interested in ESAS 2007 - Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. Submission deadline is 31 January 2007. The workshop will be held in Cambridge, UK on 2 and 3 July 2007.

Call for Papers

(Also available as plain text or one-page PDF .)

Research in pervasive computing continues to gain momentum. The importance of security and privacy in a pervasive computing environment cannot be underestimated. As in previous years, PerSec 2007 will bring together the world's experts on this topic and provide an international forum to stimulate and disseminate original research ideas and results in this field.


Contributions are solicited in all aspects of security and privacy in pervasive computing, including:

Instructions for Authors

Instructions for authors of accepted papers

Important dates

Program Co-Chairs

Steering Committee Chair

Program Committee

Previous Persec workshops

  1. Persec 2004, Orlando, Florida, USA.
  2. Persec 2005, Kauai Island, Hawaii, USA.
  3. Persec 2006, Pisa, Italy.


Details on the conference hotel, accommodation, travel, tourist information and so on will appear on the web site of the main conference.

Workshop Registration

Register online at the PerCom registration page.

Workshop Programme

The 30-minute slots for paper presentations will roughly consist of 20 minutes of talk and 10 minutes of discussion and questions, not 30 minutes of uninterrupted lecturing. In the spirit of making the workshop interactive, audience participation, discussion and controversy will be actively encouraged.

Welcome address
Cryptanalysis of Two Lightweight RFID Authentication Schemes
Benessa Defend, Kevin Fu and Ari Juels
Public-Key Cryptography for RFID-Tags
Jorge Guajardo, Lejla Batina, Tim Kerins, Nele Mentens, Pim Tuyls and Ingrid Verbauwhede
Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack
Yang Cui, Kazukuni Kobara, Kanta Matsuura and Hideki Imai
RIPP-FS: an RFID Identification, Privacy Preserving protocol with Forward Secrecy
Mauro Conti, Roberto Di Pietro, Luigi Vincenzo Mancini and Angelo Spognardi
Privacy Protection in Dynamic Systems Based on RFID Tags
Miroslaw Kutylowski, Marek Klonowski and Jacek Cichon
Distributed, Uncertainty-Aware Access Control for Pervasive Computing
Urs Hengartner and Ge Zhong
Towards an Open Source Toolkit for Ubiquitous Device Authentication
Rene Mayrhofer
End of workshop

Top | Call for Papers - Instructions for Authors - Important dates - Program Committee - Previous workshops | Logistics - Registration | Workshop Programme

Valid HTML 4.0! (recheck) Valid CSS! (recheck) Best Viewed With Any Browser