-------------------------------------------------------------------
SecPriWiMob'2009: http://www.icsd.aegean.gr/SecPri_WiMob_2009/default.htm
International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications (WiMob'2009 workshop)
Marrakech, Morocco, October 12 2009.
Submission deadline: June 7, 2009
All SecPriWiMob 2009 accepted papers will be published in the main IEEE WiMob 2009 Proceedings, published by IEEE (http://conferences.computer.org/WiMob2009/).
SecPri_WiMob 2009 workshop is using the EDAS Conference Management System (http://www.edas.info/ ) to manage paper submissions process. In order to submit a paper, authors must first create an EDAS account if they do not have already one. The EDAS system will e-mail a password. Then authors can login to EDAS using the password they have received. EDAS will provide authors with a submissions homepage where they can register their SecPri_WiMob 2009 paper submission and make appropriate changes.
SecPri_WiMob 2009 Workshop Program co-Chairs
Peter Mueller, IBM Zurich Research Lab., Switzerland
Stefanos Gritzalis, University of the Aegean, Greece
Jelena Misic, University of Manitoba, Canada
Costas Lambrinoudakis, University of the Aegean, Greece
List of topics
We welcome the submission of papers from the full spectrum of issues related with Security and Privacy in Wireless and Mobile Computing, Networking and Communications. Papers may focus on protocols, architectures, methods, technologies, applications, practical experiences, simulation results and analysis, theory and validation on topics include, but not limited to:
- Cryptographic Protocols for Mobile and Wireless Networks
- Key Management in Mobile and Wireless Computing
- Reasoning about Security and Privacy
- Privacy and Anonymity in Mobile and Wireless Computing
- Public Key Infrastructure in Mobile and Wireless Environments
- Economics of Security and Privacy in Wireless and Mobile environments
- Security Architectures and Protocols in Wireless LANs
- Security Architectures and Protocols in B3G/4G Mobile Networks
- Security and Privacy features into Mobile and Wearable devices
- Location Privacy
- Ad hoc Networks Security
- Sensor Networks Security
- Wireless Ad Hoc Networks Security
- Role of Sensors to Enable Security
- Security and Privacy in Pervasive Computing
- Trust Establishment, Negotiation, and Management
- Secure PHY/MAC/routing protocols
- Security under Resource Constraints (bandwidth, computation constraints, energy)
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment