2009-12-08

[Tccc] CFP: Security for Mobile Networks in ACM Mobility 2010 Conference

==================================
ACM Mobility 2010 Conference

Jeju Island, Korea,
August 30 - September 1, 2010

http://www.acmmobility2010.org/
==================================

Special Session

Security for Mobile Networks

==================================

CHAIRPERSONS

Lei Shu
Nishio Lab., Department of Multimedia Engineering,
Graduate School of Information Science and Technology
Osaka University, Japan
E-mail: lei.shu@ieee.org


Weiwei Yuan
UC Lab, Department of Computer Engineering,
Kyung Hee University, Korea
E-mail: weiwei@oslab.khu.ac.kr


Donghai Guan
UC Lab, Department of Computer Engineering,
Kyung Hee University, Korea
E-mail: donghai@oslab.khu.ac.kr

SYNOPSIS

With the rapid development and the increasing complexity of the mobile communications, traditional security technologies and measures can not meet the demand for integrated and dynamic security solutions. The unique characteristics of mobile networks pose a number of challenges in terms of security, such as trust establishment, key management, privacy and anonymity. This special section aims to identify and explore the different issues and challenges related to security aspects in mobile networks. What are the benefits or inconvenience of mobility on security? What are the appropriate mobility models to have a good level of security? Are Classical IDS approaches appropriate for mobile environments? How can we build up trusted platforms and trustworthy systems for mobile networks?


This special session will be held in conjunction with ACM Mobility Conference 2009, an ideal vehicle for bringing together researchers, scientists, engineers, academics and students all around the world to share the latest updates on new mobile technologies that would shape the next generation of mobile systems and technology platforms. We are interested in the areas, but are not limited to, the following topics:


Submission Topics

1. Trust management in mobile networks
2. Risk management in mobile networks
3. Privacy in mobile networks
4. Cryptographic devices for mobile networks
5. Key management in mobile networks
6. Authentication in mobile networks
7. Access control in mobile networks
8. Anonymity in mobile networks
9. Reliability and fault tolerance in mobile networks
10. Secure mobile routing protocols
11. Security under resource constraints
12. Performance and security trade-offs in mobile networks
13. Intrusion detection in mobile networks
14. Secure mobile location services
15. Denial of service in mobile networks

Please take note of the important deadlines:

Papers Submission: 19 April 2010
Notification of Acceptance of Paper: 24 May 2010
Full papers Submission Deadline: 28 June 2010
Author Early Registration Deadline: 05 July 2010
Conference: 30 August - 1 September 2010


Lei SHU
--
Specially Assigned Research Fellow,
EB, KSII Transactions (TIIS)
Nishio Lab., Department of Multimedia Engineering
Graduate School of Information Science and Technology
Osaka University, Japan
http://sites.google.com/site/leonleishu/
Email: lei.shu@ieee.org

_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

No comments: