13th
International Conference of Security, Privacy and Trust Management (SPTM 2025)
July 26 ~ 27, 2025, London, United Kingdom
https://csit2025.org/sptm/index
Scope & Topics
13th
International Conference of Security, Privacyand Trust Management (SPTM 2025)
looks for significant contributions to Trust management for networks. Original papers are invited
on Security, Privacy and Trust Management of wireless and wired networks. The goal of this
Conference is to bring together researchers and practitioners from academia and industry to focus
on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to the conference by submitting articles that illustrate research
results, projects, surveying works and industrial experiences that describe significant advances in
the following areas, but are not limited to.
Topics of interest include, but are not limited to, the following:
 Agent Based Trust Management
 Authorization, Authentication and Identity Management
 Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust
 Decentralized Trust Management
 Multimedia Content Management
 Pervasive Computation Trust
 Policy of Trust in E-leaning systems
 Social Networks & Web 2.0 Trust Management
 Trust and Reputation Management
 Trust in Service-Oriented Architecture- Open Architecture and Services
 Trust Management for virtual organizations
 Trust Management system for Wireless, Mobile and Sensor networks
 Trust, Security, Privacy, Policy management
 Trust/risk based security frameworks
Paper Submission
Authors are invited to submit papers through the conference Submission System by May 24, 2025.
Submissions must be original and should not have been published previously or be under
consideration for publication while being evaluated for this conference. The proceedings of the
conference will be published by Computer Science Conference Proceedings in Computer Science
& Information Technology (CS & IT) series (Confirmed).
Selected papers from SPTM 2025, after further revisions, will be published in the special issues
of the following journals
 International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI
Indexed
 International Journal on Cryptography and Information Security (IJCIS)
 International Journal of Security, Privacy and Trust Management (IJSPTM)
 Information Technology in Industry (ITII)
Important Dates
 Submission Deadline : May 24, 2025
 Authors Notification : June 28, 2025
 Registration & Camera-Ready Paper Due : July 05, 2025
Contact Us
Here's where you can reach us : sptm@csit2025.org or sptmconf@yahoo.com
Submission Url
https://csit2025.org/submission/index.php

More Related Content

PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
PDF
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
PDF
9th International Conference of Security, Privacy and Trust Management (SPTM ...
PDF
Call for Papers - 9th International Conference of Security, Privacy and Trust...
PDF
Call for Papers - 8th International Conference of Security, Privacy and Trust...
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
13th International Conference of Security, Privacy and Trust Management (SPTM...
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...
Call for Papers - 9th International Conference of Security, Privacy and Trust...
Call for Papers - 8th International Conference of Security, Privacy and Trust...
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )

Similar to 13th International Conference of Security, Privacy and Trust Management (SPTM 2025) (20)

PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
International Journal of Security, Privacy and Trust Management ( IJSPTM )
Ad

More from ClaraZara1 (20)

PDF
A New Framework for Securing Personal Data Using the Multi-Cloud
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
3rd International Conference on Security & Applications (SECURA 2025)
PDF
Title : Document Selection Using Mapreduce
PDF
An Effective Semantic Encrypted Relational Data Using K-Nn Model
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
July 2025 - Top 10 Read Articles in International Journal of Security, Privac...
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
10th International Conference on Networks, Communications, Wireless and Mobil...
PDF
17th International Conference on Wireless & Mobile Network (WiMo 2025)
PDF
3rd International Conference on Blockchain and Applications (BLKCA 2025)
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
6th International Conference on Software Engineering, Security and Blockchain...
PDF
17th International Conference on Network and Communications Security (NCS 2025)
PDF
Using Lattice To Dynamically Prevent Information Leakage For Web Services
PDF
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
PDF
Data Privacy and Digital Rights: Protecting Privacy through Law Surveillance ...
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
PDF
6th International Conference on Advances in Software Engineering (ASOFT 2025)
PDF
International Journal of Security, Privacy and Trust Management ( IJSPTM )
A New Framework for Securing Personal Data Using the Multi-Cloud
International Journal of Security, Privacy and Trust Management ( IJSPTM )
3rd International Conference on Security & Applications (SECURA 2025)
Title : Document Selection Using Mapreduce
An Effective Semantic Encrypted Relational Data Using K-Nn Model
International Journal of Security, Privacy and Trust Management ( IJSPTM )
July 2025 - Top 10 Read Articles in International Journal of Security, Privac...
International Journal of Security, Privacy and Trust Management ( IJSPTM )
10th International Conference on Networks, Communications, Wireless and Mobil...
17th International Conference on Wireless & Mobile Network (WiMo 2025)
3rd International Conference on Blockchain and Applications (BLKCA 2025)
International Journal of Security, Privacy and Trust Management ( IJSPTM )
6th International Conference on Software Engineering, Security and Blockchain...
17th International Conference on Network and Communications Security (NCS 2025)
Using Lattice To Dynamically Prevent Information Leakage For Web Services
3rd International Conference on Machine Learning and IoT (MLIoT 2025)
Data Privacy and Digital Rights: Protecting Privacy through Law Surveillance ...
International Journal of Security, Privacy and Trust Management ( IJSPTM )
6th International Conference on Advances in Software Engineering (ASOFT 2025)
International Journal of Security, Privacy and Trust Management ( IJSPTM )
Ad

Recently uploaded (20)

PPTX
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
PDF
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
PPTX
Unit IImachinemachinetoolopeartions.pptx
PDF
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
PPTX
Solar energy pdf of gitam songa hemant k
PPT
UNIT-I Machine Learning Essentials for 2nd years
PPTX
chapter 1.pptx dotnet technology introduction
PDF
Cryptography and Network Security-Module-I.pdf
PDF
ST MNCWANGO P2 WIL (MEPR302) FINAL REPORT.pdf
PDF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
PPT
Comprehensive Java Training Deck - Advanced topics
PDF
Performance, energy consumption and costs: a comparative analysis of automati...
PPTX
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
PDF
Lesson 3 .pdf
PDF
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
PPTX
Software-Development-Life-Cycle-SDLC.pptx
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PPTX
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
PDF
V2500 Owner and Operatore Guide for Airbus
PPTX
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
Unit IImachinemachinetoolopeartions.pptx
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
Solar energy pdf of gitam songa hemant k
UNIT-I Machine Learning Essentials for 2nd years
chapter 1.pptx dotnet technology introduction
Cryptography and Network Security-Module-I.pdf
ST MNCWANGO P2 WIL (MEPR302) FINAL REPORT.pdf
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
Comprehensive Java Training Deck - Advanced topics
Performance, energy consumption and costs: a comparative analysis of automati...
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
Lesson 3 .pdf
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
Software-Development-Life-Cycle-SDLC.pptx
Design ,Art Across Digital Realities and eXtended Reality
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
V2500 Owner and Operatore Guide for Airbus
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS

13th International Conference of Security, Privacy and Trust Management (SPTM 2025)

  • 1. 13th International Conference of Security, Privacy and Trust Management (SPTM 2025) July 26 ~ 27, 2025, London, United Kingdom https://csit2025.org/sptm/index Scope & Topics 13th International Conference of Security, Privacyand Trust Management (SPTM 2025) looks for significant contributions to Trust management for networks. Original papers are invited on Security, Privacy and Trust Management of wireless and wired networks. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to. Topics of interest include, but are not limited to, the following:  Agent Based Trust Management  Authorization, Authentication and Identity Management  Cloud, P2P, Clusters and Grid Computing : Security and Role of Trust  Decentralized Trust Management  Multimedia Content Management  Pervasive Computation Trust  Policy of Trust in E-leaning systems  Social Networks & Web 2.0 Trust Management  Trust and Reputation Management  Trust in Service-Oriented Architecture- Open Architecture and Services  Trust Management for virtual organizations  Trust Management system for Wireless, Mobile and Sensor networks  Trust, Security, Privacy, Policy management  Trust/risk based security frameworks Paper Submission Authors are invited to submit papers through the conference Submission System by May 24, 2025. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed). Selected papers from SPTM 2025, after further revisions, will be published in the special issues of the following journals
  • 2.  International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed  International Journal on Cryptography and Information Security (IJCIS)  International Journal of Security, Privacy and Trust Management (IJSPTM)  Information Technology in Industry (ITII) Important Dates  Submission Deadline : May 24, 2025  Authors Notification : June 28, 2025  Registration & Camera-Ready Paper Due : July 05, 2025 Contact Us Here's where you can reach us : [email protected] or [email protected] Submission Url https://csit2025.org/submission/index.php