2009-05-26

[Tccc] CFP: SecPriWiMob 2009, in conjunction with IEEE WiMob 2009, Marrakesh , Morocco: Submission deadline June 7

Apologies if you receive multiple copies of this posting.
-------------------------------------------------------------------

SecPriWiMob'2009: http://www.icsd.aegean.gr/SecPri_WiMob_2009/default.htm

International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (WiMob'2009 workshop)
Marrakech, Morocco, October 12 2009.


Submission deadline: June 7, 2009

All SecPriWiMob 2009 accepted papers will be published in the main IEEE WiMob 2009 Proceedings, published by IEEE (http://conferences.computer.org/WiMob2009/).

SecPri_WiMob 2009 workshop is using the EDAS Conference Management System (http://www.edas.info/ ) to manage paper submissions process. In order to submit a paper, authors must first create an EDAS account if they do not have already one. The EDAS system will e-mail a password. Then authors can login to EDAS using the password they have received. EDAS will provide authors with a submissions homepage where they can register their SecPri_WiMob 2009 paper submission and make appropriate changes.

SecPri_WiMob 2009 Workshop Program co-Chairs

Peter Mueller, IBM Zurich Research Lab., Switzerland

Stefanos Gritzalis, University of the Aegean, Greece

Jelena Misic, University of Manitoba, Canada

Costas Lambrinoudakis, University of the Aegean, Greece

List of topics

We welcome the submission of papers from the full spectrum of issues related with Security and Privacy in Wireless and Mobile Computing, Networking and Communications. Papers may focus on protocols, architectures, methods, technologies, applications, practical experiences, simulation results and analysis, theory and validation on topics include, but not limited to:

- Cryptographic Protocols for Mobile and Wireless Networks

- Key Management in Mobile and Wireless Computing

- Reasoning about Security and Privacy

- Privacy and Anonymity in Mobile and Wireless Computing

- Public Key Infrastructure in Mobile and Wireless Environments

- Economics of Security and Privacy in Wireless and Mobile environments

- Security Architectures and Protocols in Wireless LANs

- Security Architectures and Protocols in B3G/4G Mobile Networks

- Security and Privacy features into Mobile and Wearable devices

- Location Privacy

- Ad hoc Networks Security

- Sensor Networks Security

- Wireless Ad Hoc Networks Security

- Role of Sensors to Enable Security

- Security and Privacy in Pervasive Computing

- Trust Establishment, Negotiation, and Management

- Secure PHY/MAC/routing protocols

- Security under Resource Constraints (bandwidth, computation constraints, energy)

_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: