Instructions for Paper Submissions
Submissions should be in the PDF format, viewable with Adobe Acrobat reader. Submissions should be sent as an attachment of email to

. Please complete the following submission form in the body content of the mail. The confirmation of submission will be sent as soon as your mail is received. All submissions must be received by
August 20, 2006, and notification of acceptance will be sent by
September 30, 2006.
----------------------------
Title of Paper
----------------------------
* Title:
----------------------------
Type of Paper (choose one)
----------------------------
* regular technical paper (at most 12 pages)
* short paper for work-in-progress (at most 6 pages)
* short paper for case studies (at most 6 pages)
* short paper for position papers (at most 6 pages)
----------------------------
List of Authors
----------------------------
#1
* First name(s):
* Last name:
* Email:
* Institution:
#2
* First name(s):
* Last name:
* Email:
* Institution:
#3
* First name(s):
* Last name:
* Email:
* Institution:
#4
* First name(s):
* Last name:
* Email:
* Institution:
----------------------------
Contact Information
----------------------------
* Title (choose one): Dr./Mr./Ms./Prof.
* First Name:
* Last Name:
* Affiliation/organization:
* Affiliation Dept/Lab
* Phone:
* Fax:
* Email:
* Building:
* Mail Code:
* Street Address:
* City/Town:
* State/Province:
* Country:
* Zip/Postal Code:
----------------------------
Summary
!! Type a short ASCII summary for your submission.!!
!! It should not include the author/title information.!!
!! you may not exceed 300 words.!!
----------------------------
Summary:
----------------------------
Keywords/Topics:
!!choose one or multiple relevant keywords from the following!!
----------------------------
01. models and principles for trusted computing
02. formal models and verification
03. software- or hardware-based approaches
04. cryptographic approaches
05. remote attestation of trusted devices
06. standardization in trusted computing groups
07. issues in trusted platform modules
08. property-based and semantic attestation
09. theory and practice for trusted virtual domains
10. privacy and legal issues
11. applications and case studies
12. compliance and conformance
13. trust evaluations of computing systems
14. scalability
15. applications and use cases
16. system and platform architectures
17. access control and information flow control
18. communications
19. virtualization and trusted computing
20. trusted client architectures
21. integrity-evaluating architectures
22. integrity management infrastructures
23. others (please write down appropriate keywords: )
----------------------------
Attachment of the paper
!! The file's name should have a name such as "paper.pdf".!!
----------------------------
Adobe PDF (pdf).