The 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications

TrustCom 2022


Security & Trust & Testing



The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.
Scope and Topics
Track 1: Trust Track
Trust semantics, metrics and models
Trusted computing platform
Trusted network computing
Trusted operating systems
Trusted software and applications
Trust in social networks
Trust in e-commerce and e-government
Trust in mobile and wireless communications
Risk and reputation management
Survivable computer systems/networks
Trust in 5G networks
Miscellaneous trust issues in cyber Security
System reverse engineering
Watermarking and security
Cryptanalysis and security solutions
Track 2: Security Track
Network and cyber security
Computer security
Database security
Web applications security
Security policy, model and architecture
Security in social networks
Security in parallel and distributed systems
Security in mobile and wireless communications
Security in cloud/pervasive computing
Authentication, authorization and accounting
Security of 5G Networks
Miscellaneous security issues
Steganography and steganalysis
Security-aware facial recognition
Track 3: Privacy Track
Privacy in web-based applications and services
Privacy in database systems
Privacy in parallel and distributed systems
Privacy in cloud/pervasive computing
Privacy in mobile and wireless communications
Privacy in e-commerce and e-government
Privacy in network deployment and management
Privacy and trust
Privacy and security
Privacy and anonymity
Privacy preservation in 5G
Miscellaneous privacy issues
Privacy-preserving biometrics
Track 4: Forensics and Analytics Track
Anti-forensics and analytics
Big data forensics
CCTV forensics
Cloud forensics
Computational forensics
Cyber-physical system forensics
Datamining for forensics
Fingerprint forensics
Image forensics
Malware forensics
Mobile app forensics (e.g. Skype, WeChat and Facebook)
Mobile device forensics
Multimedia forensics
Network forensics
Track 5: Emerging Tech Track
Emerging hardware security
Emerging security problems and solutions in edge/fog computing
Emerging paradigms of deep learning in security
Emerging applications of reinforcement learning for securing networks
Emerging secure mechanisms for service delivery models
Emerging quantum safe cryptography for 5G
Emerging techniques in intelligent transportation systems
Emerging network attacks & anomalies detection and prevention
Emerging approaches to cybersecurity
Emerging techniques in identity management
Emerging approaches of smart contract and distributed ledger
Emerging blockchain techniques