{"id":120,"date":"2018-01-04T13:54:39","date_gmt":"2018-01-04T19:54:39","guid":{"rendered":"http:\/\/engineering3.flywheelsites.com\/gchen\/?page_id=120"},"modified":"2018-01-22T20:30:24","modified_gmt":"2018-01-23T02:30:24","slug":"iotpst2018","status":"publish","type":"page","link":"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/","title":{"rendered":"IoTPST 2018"},"content":{"rendered":"<h2 style=\"text-align: center\"><span style=\"color: #000000;font-family: 'times new roman', times, serif\"><strong>The 8th International Workshop on Internet on Things: Privacy, Security and Trust (IoTPST 2018)<\/strong><\/span><\/h2>\n<p style=\"text-align: center\"><span style=\"font-family: 'times new roman', times, serif\"><strong>(in conjunction with <a href=\"http:\/\/icccn.org\/icccn18\/\">ICCCN 2018)<\/a><\/strong><\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-family: 'times new roman', times, serif\">Hangzhou, China<\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-family: 'times new roman', times, serif\">July 30-August 2, 2018<\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-family: 'times new roman', times, serif\">Submit paper at\u00a0<span style=\"color: #0000ff\">https:\/\/easychair.org\/conferences\/?conf=iotpst2018<\/span><\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-family: 'times new roman', times, serif\">Call for Paper[<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/docs.google.com\/viewer?a=v&amp;pid=sites&amp;srcid=ZGVmYXVsdGRvbWFpbnxndWVuZXZlcmVxaWFuY2hlbnxneDozZjYzMTg3OTU4MjQ4NTVj\">PDF<\/a><\/span>]<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0[<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/#General_Information\">General Info<\/a><\/span>] [<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/#Scope_and_Topics\">Scope and Topics<\/a><\/span>] [<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/#Important_Dates\">Important Dates<\/a><\/span>] [<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/#Submissions_and_Publications\">Submissions and Publications<\/a><\/span>] [<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/#Organizing_Committees\">Organizing Committees<\/a><\/span>] [<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/#Travel_Information\">Travel Information<\/a><\/span>][<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/#Contact\">Contact<\/a><\/span>]<\/span><\/p>\n<h3><span style=\"font-family: 'times new roman', times, serif\"><strong>General Information<\/strong><\/span><\/h3>\n<p><span style=\"font-family: 'times new roman', times, serif\">The 8th International Workshop on Internet on Things: Privacy, Security and Trust (IoTPST 2018) will be held in conjunction with the <a href=\"http:\/\/www.icccn.org\/icccn18\/\"><em>The 27th International Conference on Computer Communications and Networks<\/em> (<em>ICCCN 2018<\/em>)<\/a>, in Hangzhou, China. All papers presented in IoTPST 2018 will be published in the workshop proceedings.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Outstanding papers will be invited to extend to full version for a SCI(E)-indexed journal, which is currently under contact.<\/span><\/p>\n<h3><span style=\"font-family: 'times new roman', times, serif\"><strong>Scope and Topics<\/strong><\/span><\/h3>\n<p><span style=\"font-family: 'times new roman', times, serif\">Internet of Things (IoT) technology, a new paradigm of the development of the Internet, has been developed and applied into cyber-physical social systems such as industrial control systems and healthcare information systems. The growth and application of these IoT devices such as smart phones, sensors, healthcare wearables, connected vehicles, smart home gadgets and appliances are expected to improve the intelligence of cyber physical systems, enhance the reliability, resilience, operational efficiency, and energy efficiency of current information systems while reducing system costs and resource consumption. However, when IoT devices are pervasively used in cyber physical systems, their security, privacy and trustworthiness have become critical issues. In October 2016, 150,000 compromised IoT devices composed of CCTV cameras and digital video recorders were used as botnets by hackers to launch massive and sustained Distributed Denial of Service (DDoS) attacks that have caused outages and network congestion for a large number of websites. By the year 2020, it says that 50 billion devices will be exposed to cyber attacks.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Moreover, specific features such as portability, mobility, and sensitivity of IoT devices, further impose the challenge of security and privacy in those systems. Despite recent advances, many research issues still remain in the design of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. For example, when IoT devices have more storage space, high bandwidth, and super sensing capability, more sensitive information will be stored in those devices. On the other hand, operating systems running on those devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of those devices. With more IoT devices being used in cyber physical social systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged to addressing security issues of IoT special characteristics. Other issues such as malware, cyber threat, intrusion detection, attack modeling, security analysis, identity management and anonymity techniques also need to be revisited in the IoT systems.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">This workshop aims to bring together the technologists and researchers who share interest in the area of IoT security, privacy and trust, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the models and designs of secure, privacy preserving, or trust architectures, protocols, algorithms, services, and applications, as well as analysis on cyber threat in IoT systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical, experimental research, and work in-progress for IoT security, privacy and trust related issues that include, but are not limited to, the following:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li><span style=\"font-family: 'times new roman', times, serif\">Healthcare Information Systems<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Internet of Things Security<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Self-protecting computing systems<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Cryptography for Mobile and Wireless Systems<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Cryptography for Cloud Computing, Fog\/Edge Computing<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Wireless Local Area Networks<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Wireless Sensor Networks<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Wireless Mesh Networks<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Wireless Ad-hoc Networks<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Vehicular Networks<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Body-area Networks<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Cellular Networks (4G, 5G, \u2026)<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">WiMAX Networks<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Machine to Machine (M2M) Networks<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Software Defined Networks (SDN)<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Social Networks<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Smart Grid<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">RFID-based Systems<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Mobile Cloud<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Cyber-Physical Systems (CPS)<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Internet of Things<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Location-based Service Systems<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Mobile Healthcare Systems<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Smart Building Systems<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">Big Data<\/span><\/li>\n<li><span style=\"font-family: 'times new roman', times, serif\">IoT Cyber Security Education<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3><span style=\"font-family: 'times new roman', times, serif\"><strong>Important Dates<\/strong><\/span><\/h3>\n<p><span style=\"font-family: 'times new roman', times, serif\">Paper submission due: March 31, 2018<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Acceptance notification: April 28, 2018<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Camera-ready due:\u00a0 May 10, 2018<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Workshop: August 2, 2018<\/span><\/p>\n<h3><span style=\"font-family: 'times new roman', times, serif\"><strong>Submissions and Publications<\/strong><\/span><\/h3>\n<p><span style=\"font-family: 'times new roman', times, serif\">Authors are invited to submit manuscripts reporting original unpublished research and recent developments in the topics related to the workshop. Submissions should include a title, abstract, keywords, author(s) and affiliation(s) with postal and e-mail address(es) of the corresponding author. Submitted manuscripts must be formatted in standard IEEE camera-ready format (double-column, 10-pt font) and must be submitted via EasyChair (<span style=\"color: #0000ff\">https:\/\/easychair.org\/conferences\/?conf=iotpst2018<\/span>) under &#8220;8th International Workshop on Internet on Things: Privacy, Security and Trust&#8221; as PDF files (formatted for 8.5&#215;11-inch paper). The manuscripts should be no longer than 6 pages. Two additional page is permitted if the authors are willing to pay an over-length charge at the time of publication (manuscripts should not exceed 8 pages).<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Submitted papers cannot have been previously published in or be under consideration for publication in another journal or conference. The workshop Program Committee reserves the right to not review papers that either exceed the length specification or have been submitted or published elsewhere. Submissions must include a title, abstract, keywords, author(s) and affiliation(s) with postal and e-mail address(es). All authors of a paper must be registered in the RIGHT order via EasyChair at the SUBMISSION TIME and cannot be changed after the submission due time at EasyChair. The paper title and author name list\/order cannot be changed during the final camera-ready submission.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">Outstanding papers will be invited to extend to full version for a prestigious journal, Journal of Security and Network targeting publication in early 2018.\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">When uploading a camera-ready at IEEE, note that the paper title, author names\/affiliation and order must be IDENTICAL to the original submission for peer reviewing. No title change, author addition or removal is allowed.<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">A paper must be registered by a co-author in the full rate. It must be presented by one of registered authors in the venue.\u00a0<\/span><span style=\"font-family: 'times new roman', times, serif\">Camera-ready and registration due date May 10, 2018 is FIRM. Check <a href=\"http:\/\/icccn.org\/icccn18\/\">ICCCN homepage<\/a> to find detailed instructions. Please try to complete the process as early as possible in order to avoid the rush hour, giving you time to deal with unexpected but possible issues\/delay.<\/span><\/p>\n<h3><span style=\"font-family: 'times new roman', times, serif\"><strong>Organizing Committees<\/strong><\/span><\/h3>\n<h4><span style=\"font-family: 'times new roman', times, serif\"><strong>Workshop Program Co-Chairs<\/strong><\/span><\/h4>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Guenevere (Qian) Chen, The University of Texas at San Antonio, USA<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0Sherif Abdelwahed, Virginia Commonwealth University, USA<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Zhan Qin,\u00a0The University of Texas at San Antonio, USA<\/span><\/p>\n<h4><span style=\"font-family: 'times new roman', times, serif\"><strong>Technical Program Committees<\/strong><\/span><\/h4>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Yanmin Gong, Oklahoma State University, USA<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Zhidong Shen, Wuhan University, China<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Kewei Sha, University of Houston Clear Lake, USA<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Jian Shi, Mississippi State University, USA<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Toshifusa Sekizawa, Nihon University, Japan<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Frederick Sheldon, The University of Idaho, USA<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Robert Abercrombie, The University of Memphis, USA<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Wilson Rivera-Gallego, University of Puerto Rico at Mayaguez, USA<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Zhiwei Wang, Nanjing University of Posts and Telecommunications, China<\/span><\/p>\n<p><span style=\"font-family: 'times new roman', times, serif\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Wenjia Li, New York Institute of Technology, USA<\/span><\/p>\n<h3><span style=\"font-family: 'times new roman', times, serif\"><strong>Travel Information<\/strong><\/span><\/h3>\n<p><span style=\"font-family: 'times new roman', times, serif\">The reservation info of the registration and conference hotel on the ICCCN 2018 website; <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/icccn.org\/icccn18\/travel\/\">http:\/\/icccn.org\/icccn18\/travel\/<\/a>.<\/span> Please make the reservations ASAP to take advantage of the reduced rate for ICCCN 2018<\/span><\/p>\n<h3><span style=\"font-family: 'times new roman', times, serif\"><strong>Contact Information<\/strong><\/span><\/h3>\n<p><span style=\"font-family: 'times new roman', times, serif\"><span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"mailto:guenevereqian.chen@utsa.edu\">Guenevere (Qian) Chen<\/a><\/span>, The University of Texas at San Antonio, USA<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 8th International Workshop on Internet on Things: Privacy, Security and Trust (IoTPST 2018) (in conjunction with ICCCN 2018) Hangzhou, China July 30-August 2, 2018 Submit paper at\u00a0https:\/\/easychair.org\/conferences\/?conf=iotpst2018 Call for Paper[PDF] \u00a0[General Info] [Scope and Topics] [Important Dates] [Submissions and Publications] [Organizing Committees] [Travel Information][Contact] General Information The 8th International Workshop on Internet on Things: &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;IoTPST 2018&#8221;<\/span><\/a><\/p>\n","protected":false},"author":198,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-120","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IoTPST 2018 - Guenevere Chen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoTPST 2018 - Guenevere Chen\" \/>\n<meta property=\"og:description\" content=\"The 8th International Workshop on Internet on Things: Privacy, Security and Trust (IoTPST 2018) (in conjunction with ICCCN 2018) Hangzhou, China July 30-August 2, 2018 Submit paper at\u00a0https:\/\/easychair.org\/conferences\/?conf=iotpst2018 Call for Paper[PDF] \u00a0[General Info] [Scope and Topics] [Important Dates] [Submissions and Publications] [Organizing Committees] [Travel Information][Contact] General Information The 8th International Workshop on Internet on Things: &hellip; Continue reading &quot;IoTPST 2018&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/\" \/>\n<meta property=\"og:site_name\" content=\"Guenevere Chen\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-23T02:30:24+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/iotpst2018\\\/\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/iotpst2018\\\/\",\"name\":\"IoTPST 2018 - Guenevere Chen\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/#website\"},\"datePublished\":\"2018-01-04T19:54:39+00:00\",\"dateModified\":\"2018-01-23T02:30:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/iotpst2018\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/iotpst2018\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/iotpst2018\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoTPST 2018\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/#website\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/\",\"name\":\"Guenevere Chen\",\"description\":\"This photo of the BSE can be changed to anything you like, or switched out to a video. The COE logo can also be switched out for your labs logo or deleted.\",\"publisher\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/#organization\",\"name\":\"UTSA College of Engineering\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/wp-content\\\/uploads\\\/sites\\\/114\\\/2017\\\/07\\\/cropped-COE-Casual-single.png\",\"contentUrl\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/wp-content\\\/uploads\\\/sites\\\/114\\\/2017\\\/07\\\/cropped-COE-Casual-single.png\",\"width\":1932,\"height\":250,\"caption\":\"UTSA College of Engineering\"},\"image\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/gchen\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoTPST 2018 - Guenevere Chen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/","og_locale":"en_US","og_type":"article","og_title":"IoTPST 2018 - Guenevere Chen","og_description":"The 8th International Workshop on Internet on Things: Privacy, Security and Trust (IoTPST 2018) (in conjunction with ICCCN 2018) Hangzhou, China July 30-August 2, 2018 Submit paper at\u00a0https:\/\/easychair.org\/conferences\/?conf=iotpst2018 Call for Paper[PDF] \u00a0[General Info] [Scope and Topics] [Important Dates] [Submissions and Publications] [Organizing Committees] [Travel Information][Contact] General Information The 8th International Workshop on Internet on Things: &hellip; Continue reading \"IoTPST 2018\"","og_url":"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/","og_site_name":"Guenevere Chen","article_modified_time":"2018-01-23T02:30:24+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/","url":"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/","name":"IoTPST 2018 - Guenevere Chen","isPartOf":{"@id":"https:\/\/ceid.utsa.edu\/gchen\/#website"},"datePublished":"2018-01-04T19:54:39+00:00","dateModified":"2018-01-23T02:30:24+00:00","breadcrumb":{"@id":"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ceid.utsa.edu\/gchen\/iotpst2018\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ceid.utsa.edu\/gchen\/"},{"@type":"ListItem","position":2,"name":"IoTPST 2018"}]},{"@type":"WebSite","@id":"https:\/\/ceid.utsa.edu\/gchen\/#website","url":"https:\/\/ceid.utsa.edu\/gchen\/","name":"Guenevere Chen","description":"This photo of the BSE can be changed to anything you like, or switched out to a video. The COE logo can also be switched out for your labs logo or deleted.","publisher":{"@id":"https:\/\/ceid.utsa.edu\/gchen\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ceid.utsa.edu\/gchen\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ceid.utsa.edu\/gchen\/#organization","name":"UTSA College of Engineering","url":"https:\/\/ceid.utsa.edu\/gchen\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ceid.utsa.edu\/gchen\/#\/schema\/logo\/image\/","url":"https:\/\/ceid.utsa.edu\/gchen\/wp-content\/uploads\/sites\/114\/2017\/07\/cropped-COE-Casual-single.png","contentUrl":"https:\/\/ceid.utsa.edu\/gchen\/wp-content\/uploads\/sites\/114\/2017\/07\/cropped-COE-Casual-single.png","width":1932,"height":250,"caption":"UTSA College of Engineering"},"image":{"@id":"https:\/\/ceid.utsa.edu\/gchen\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ceid.utsa.edu\/gchen\/wp-json\/wp\/v2\/pages\/120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ceid.utsa.edu\/gchen\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ceid.utsa.edu\/gchen\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/gchen\/wp-json\/wp\/v2\/users\/198"}],"replies":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/gchen\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":0,"href":"https:\/\/ceid.utsa.edu\/gchen\/wp-json\/wp\/v2\/pages\/120\/revisions"}],"wp:attachment":[{"href":"https:\/\/ceid.utsa.edu\/gchen\/wp-json\/wp\/v2\/media?parent=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}