======================================================
Call for Papers
======================================================
2010 ACM International Workshop on Security for Mobile Networks
IWSMN 2010
http://www-nishio.ist.osaka-u.ac.jp/~leishu/workshop/IWSMN2010.html
October 18-20, 2010, Singapore.
======================================================
In conjunction with:
ACM Mobility Conference 2010
http://www.acmmobility2010.org/
======================================================
This workshop will be held in conjunction with ACM Mobility Conference 2010,
an
ideal vehicle for bringing together researchers, scientists, engineers,
academics
and students all around the world to share the latest updates on new mobile
technologies that would shape the next generation of mobile systems and
technology
platforms.
======================================================
All registered and presented papers will be indexed in ACM Digital Library
and EI.
With the rapid development and the increasing complexity of the mobile
communications, traditional security technologies and measures can not meet
the demand for integrated and dynamic security solutions. The unique
characteristics of mobile networks pose a number of challenges in terms of
security, such as trust establishment, key management, privacy and
anonymity.
This workshop aims to identify and explore the different issues and
challenges
related to security aspects in mobile networks. What are the benefits or
inconvenience of mobility on security? What are the appropriate mobility
models
to have a good level of security? Are Classical IDS approaches appropriate
for
mobile environments? How can we build up trusted platforms and trustworthy
systems for mobile networks?
We are interested in the areas, but are not limited to the following topics
:
* Trust management in mobile networks
* Risk management in mobile networks
* Privacy in mobile networks
* Cryptographic devices for mobile networks
* Key management in mobile networks
* Authentication in mobile networks
* Access control in mobile networks
* Anonymity in mobile networks
* Reliability and fault tolerance in mobile networks
* Secure mobile routing protocols
* Security under resource constraints
* Performance and security trade-offs in mobile networks
* Intrusion detection in mobile networks
* Secure mobile location services
* Denial of service in mobile networks
IMPORTANT DATES
* Paper Submission: 19 April 2010
* Paper Acceptance: 07 June 2010
* Camera-ready Paper: 12 July 2010
* Author Early Registration Deadline : 12 July 2010
* Workshop Dates: 18-20 Oct. 2010(likely on 18/10)
Guideline for Authors
This workshop accepts both full papers and short papers. Full papers should
be limited
to 8 pages and short papers should be limited to 4 pages. All papers
submitted to this
workshop will be peer reviewed by three reviewers. Proceedings of workshops
will be published
in ACM Digital Library and indexed by EI. All papers published in the
workshop proceedings
must be in the ACM format. It is strongly recommended that all papers are
already in this
format when they are first submitted to the workshop.
At least one author of each accepted workshop paper will have to register
for the Mobility 2010
conference and attend the workshop to present the paper. If a paper is not
presented in the
workshop, it will be removed from the workshop proceedings.
Please submit your paper(s) in PDF format to:
* Lei Shu, lei.shu@ieee.org, and
* Weiwei Yuan, weiwei@oslab.khu.ac.kr
Program Co-chairs:
Dr. Lei Shu
Nishio Lab., Department of Multimedia Engineering,
Graduate School of Information Science and Technology
Osaka University, Japan
Dr. Weiwei Yuan
UC Lab, Department of Computer Engineering,
Kyung Hee University, Korea
Dr. Donghai Guan
UC Lab, Department of Computer Engineering,
Kyung Hee University, Korea
Publicity Chair
Dr. Kai Lin
Dalian University of Technology, China
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
1 comment:
sangambayard-c-m.com
Post a Comment