2009-04-30
[Mycolleagues] Workshop on Security and Privacy in Wireless & Mobile Computing, Networking & Communications
Call for Papers
2nd International Workshop on Security and Privacy in
Wireless & Mobile Computing, Networking & Communications 2009
(SecPriWiMob 2009)
http://www.icsd.aegean.gr/SecPri_WiMob_2009/default.htm
In conjunction with
WiMob 2009
Marrakech, Morocco
October 12th-14th, 2009
http://conferences.computer.org/wimob2009/
Scope
-----
Wireless and Mobile communication networks offer organizations and users several
benefits, such as portability, mobility and flexibility, while increasing everyday
business productivity, and reducing installation cost. Wireless Local Area Networks,
for instance, have been used in various environments, such as business, home,
conference centers, airports and many more, allowing users to move from place to
place, avoiding cabling restrictions and without being disconnected from the network.
Ad Hoc Networks are collections of wireless computers communicating among themselves
over possibly multihop paths, without the help of any infrastructure such as base
stations or access points; these networks allow data synchronization with network
systems and application sharing between devices. Mobile Ad Hoc Networks are autonomous
collection of mobile entities that communicate over relatively bandwidth constrained
wireless links, establishing survivable, efficient, dynamic communication for emergency
operations. Wireless Ad Hoc Sensor Networks consist of a number of sensors spread
across a geographical area, offering certain capabilities and enhancements in
operational efficiency in civilian applications, as well as assisting in international
effort to increase alertness to potential threats.
However, although Wireless and Mobile communication environments eliminate many of the
problems associated with traditional wired networks, the new security and privacy risks
introduced by such environments need to be reduced by exploiting appropriate security
measures and safeguards, ensuring an acceptable level of overall residual hazard.
The objectives of the SecPri_WiMob 2009 Workshop are to bring together researchers from
research communities in Wireless and Mobile Computing, Networking and Communications,
Security and Privacy, with the goal of fostering interaction
Topics of Interest
------------------
We welcome the submission of papers from the full spectrum of issues related with Security
and Privacy in Wireless and Mobile Computing, Networking and Communications. Papers may
focus on protocols, architectures, methods, technologies, applications, practical experiences,
simulation results and analysis, theory and validation on topics include, but not limited to:
- Cryptographic Protocols for Mobile &Wireless Networks
- Key Management in Mobile &Wireless Computing
- Reasoning about Security & Privacy
- Privacy and Anonymity in Mobile & Wireless Computing
- Public Key Infrastructure in Mobile & Wireless Environments
- Security under Resource Constraints
- Security Architectures and Protocols in Wireless LANs
- Economics of Security &Privacy in Wireless & Mobile environments
- Security Architectures and Protocols in B3G/4G Mobile Networks
- Ad hoc Networks Security
- Security and Privacy features into Mobile & Wearable devices
- Sensor Networks Security
- Wireless Ad Hoc Networks Security
- Role of Sensors to Enable Security
- Trust Establishment, Negotiation, &Management
- Security and Privacy in Pervasive Computing
- Location Privacy
Important Dates
---------------
Paper submission due: June 7, 2009
Paper acceptance notification: July 26, 2009
Final manuscript due: August 10, 2009
Registration: August 20, 2009
Workshop: October 12, 2009
Paper Submission
----------------
Submitted papers must represent original material that is not currently under review in
any other conference or journal, and has not been previously published. Paper length
should not exceed five-page technical paper manuscript. Please see author information
page for submission guidelines at WiMob 2009 website
(http://conferences.computer.org/wimob2009/WorkshopsSymposia.html). Papers should be
submitted in a PDF format through EDAS.
Submissions should include a cover page with authors' names, affiliations, fax and
telephone numbers and e-mail addresses. All accepted papers will be published in the
conference proceedings. At least one author of accepted papers is required to register
at the full registration rate.
Contact
-------
Stefanos Gritzalis (sgritz(at)aegean.gr)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment