Call for Papers

[CfP for printing PDF] [CfP for printing TXT]

International Conference

TRUST, the international conference on Trust and Trustworthy Computing, is an stablished forum on trusted and trustworthy computing. TRUST, currently in its 9th instantiation, brings together researchers, practitioners, and decision makers interested in new ideas for designing, building, using and understanding trusted and trustworthy computing systems. TRUST invites submissions of original work on the design, operation, and effect of trusted and trustworthy computing in any relevant field. This notably includes, but it is not limited to, network infrastructures, cloud computing, services, hardware, software and protocols.

Conference Officers

General Chair:

Program Chairs:

Program Committee

Important dates:

  • Submission deadline: 9 May, 2016 extended to May 16, 2016
  •  Notification: 17 June, 2016
  •  Camera-ready: 8 July, 2016
  •  Conference: 29-30 August, 2016

Topics of interest include, but are not limited to:

  • Architectures for trustworthy infrastructures
  • Emerging applications and technologies, including recent industrial research and development on trusted/trustworthy computing
  • Hardware security, including secure storage, cryptographic coprocessors, smartcards, and physically unclonable functions (PUFs)
  • Trustworthy applications, including webbased systems
  • Trusted mobile computing platforms
  • Trustworthy embedded, CyberPhysical, and Internet of Things systems
  • Security analysis and formal techniques for trusted/trustworthy computing
  • Verification of trusted/trustworthy computing (architectures, platforms, software, protocols)
  • Usability of trusted/trustworthy computing solutions and humancomputer interactions
  • Cloud security and trustworthy services
  • Trust management
  • Software engineering techniques for trustworthiness
  • Operating system security, including virtualization and monitoring
  • Cryptography for trusted computing and related applications
  • Intrusion detection and resilience leveraging trusted computing
  • Security policies and management of trusted/trustworthy systems
  • Experimental, userbased or testbed studies


We invite submissions of (i) full papers (up to 18 pages in LNCS format) and (ii) short papers (up to 9 pages in LNCS format).

Full papers are expected to report substantial and wellsubstantiated original results. Short papers can present work that is not fully fleshed out but brings forth novel and stimulating
ideas. Please submit short papers as such and please be aware that no full paper will be converted to a short paper as part of the review process.

All submissions must be carefully anonymized for double-blind reviewing. To submit a paper please visit our submission page.