IEEE International Workshop on Trustworthy Computing (TC 2020)


Trustworthy Computing (TC) aims at providing secure, private, and reliable computing experiences in a world where computing has become a necessity for many aspects of life. While decades have passed since the concept of trustworthy computing was introduced for military, financial, and public safety related computing systems, trustworthy computing still remains one of the key issues in the design and operation of computing systems nowadays. The ever-growing complexity of computing systems, the shift of trust to a third-party cloud service provider, and the widespread use of computing devices have made it much more difficult to implement trustworthy computing. In view of the challenges, the TC workshop is formed in conjunction with QRS 2020 to call for innovative work on the design and application of trustworthy computing. Reviews and case studies which address state-of-art research and state-of-practice industry experiences are also welcomed.


The list of topics includes, but is not limited to:

  • Policies and models of trustworthy computing
  • Security, reliability, and availability issues in computing systems and networks
  • Censorship, anonymity, and privacy issues
  • Trustworthy mobile and cloud computing
  • Smart grid, SCADA, and critical information infrastructure
  • The implication of Internet of Things on trustworthy computing
  • Online social network and human factor issues
  • Effective security protection and management of big data
  • Industrial control devices, portable devices and applications
  • Hardware support for trustworthy computing
  • Detection, prevention, and response to malware and security attacks
  • Information, system, and software assurance
  • Auditing, verification, and validation
  • Security testing, evaluation, and measurement
  • Data protection, maintenance, recovery, and risk assessment
  • Authentication, authorization, access control, and accounting
  • Software defined networking (SDN)
  • Cryptographic techniques
  • Adversarial machine learning


Authors are invited to submit original unpublished research papers as well as industrial practice papers. Simultaneous submissions to other conferences are not permitted. Detailed instructions for electronic paper submission, panel proposals, and review process can be found at

The length of a camera ready paper will be limited to eight pages, including the title of the paper, the name and affiliation of each author, a 150-word abstract, and up to 6 keywords. Shorter version papers (up to four pages) are also allowed.

Authors must follow the IEEE Computer Society Press Proceedings Author Guidelines to prepare their papers. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop. Arrangements are being made to publish selected accepted papers in reputable journals. Submissions must be in PDF format and uploaded to the conference submission site.


Program Chairs

Fu-Hau Hsu's avatar
Fu-Hau Hsu

National Central University

Yu-Sung Wu's avatar
Yu-Sung Wu

National Chiao Tung University

Previous TC

  • TC 2019 - Sofia (in conjunction with QRS 2019)
  • TC 2018 - Lisbon (in conjunction with QRS 2018)
  • TC 2017 - Prague (in conjunction with QRS 2017)
  • TC 2016 - Vienna (in conjunction with QRS 2016)
  • TC 2015 - Vancouver (in conjunction with QRS 2015)
  • TC 2014 - San Francisco (in conjunction with SERE 2014)
  • TC 2013 - Washington (in conjunction with SERE 2013)