Call for Papers

Full paper submission deadline: May 15, 2010 May 30, 2010 | PDF version

The upcoming Tyrrhenian Workshop on Digital Communications is the 21st event in its series. Organized by CNIT, the Italian inter-university consortium for telecommunications research, the Tyrrhenian workshop is each year devoted to a specific theme in the area of digital communications and their applications.

Accepted papers will be published in a book by Springer logo

This year, the chosen topic is “Trustworthy Internet”. We adopt the general definition fostered by the European Union for the word “trustworthy”, as:

secure, reliable and resilient to attacks and operational failures; guaranteeing quality of service; protecting user data; ensuring privacy and providing usable and trusted tools to support the users in their security management.

The 2010 Tyrrhenian Workshop aims at providing a lively and exciting discussion on the technical challenges and issues involved in reshaping the Internet into a trustworthy ubiquitous reality articulated around the Internet by and for People, the Internet of Contents, the Internet of Services and the Internet of Things supported by the Network Infrastructure foundation.

We solicit original and previously unpublished papers addressing research challenges and documenting technical advances, as well as discussing practical experiences and experimental efforts from both industry and academia.

Topics of interest include, but are not limited to:

  • New visions for a trustworthy Internet
  • Network security and resilience
  • Quality of Service and Quality of Experience
  • Collaborative and autonomic networking approaches
  • Network monitoring and management
  • Physical layer security
  • Trustworthy services and middleware platforms
  • Trustworthy identity management
  • Security and privacy in social networks
  • Privacy and reputation in peer-to-peer networks
  • Trustworthy content management
  • Security in multimedia distribution
  • Internet of things security and privacy
  • Socio-economic implications
  • Authentication and biometrics
  • RFID security and privacy