2010-02-01

[Tccc] CFP:2010 International workshop on Mobile Wireless Network Security

CFP: MWNS 2010 ( Submission Due: Mar. 10 )

Please accept our apologies if you receive multiple copies of this cfp

============================================================

2010 International workshop on Mobile Wireless Network Security
(MWNS 2010)
August 18-12, 2010, Changchun, China.
http://www-nishio.ist.osaka-u.ac.jp/~leishu/workshop/MWNS2010.html
Submission deadline: February 15, 2010

============================================================

In conjunction with

The 5th International Conference on Frontier of Computer Science and
Technology
(FCST 2010)
http://ccst.jlu.edu.cn/fcst/

============================================================
CALL FOR PAPERS
============================================================

OVERVIEW:

The mobile wireless networks are regarded as the key underlying
infrastructures
for realizing the next generation networking and computing, such as the
clouding
computing, the ubiquitous computing and the 4G networks. In this context,
mobile
and wireless communications are more vulnerable than the wired networks to
different
attacks such as denial of service, man in the middle, hijacking, spoofing,
etc.
In addition, they have less resources, which is a real problem in security
solution
design. These unique characteristics of the mobile wireless networks pose a
number
of challenges in terms of security. We need to design secure and robust
solutions
which are light enough to be supported by those wireless and mobile
terminals and
communications. Addressing these challenging issues can provide better
secure
services and increase the overall performance. This workshop aims to
identify and
explore the different issues and challenges related to security aspects in
mobile
wireless networks. Such as, what are the benefits or inconvenience of
mobility on
security? What are the appropriate mobility models to have a good level of
security?
Are Classical IDS approaches appropriate for mobile environments? How can we
build
up trusted platforms and trustworthy systems for mobile wireless networks?


This workshop will be held in conjunction with the 5th International
Conference on
Frontier of Computer Science and Technology (FCST 2010), an ideal vehicle
for bringing
together researchers, scientists, engineers, academics and students all
around the
world to share the latest updates on new security technologies that would
shape the
next generation of mobile wireless systems and technology platforms.

Submission Topics:
We are interested in the areas, but are not limited to, the following topics
:

* Trust management in mobile wireless networks
* Risk management in mobile wireless networks
* Privacy in mobile wireless networks
* Cryptographic devices for mobile wireless networks
* Key management in mobile wireless networks
* Authentication in mobile wireless networks
* Access control in mobile wireless networks
* Anonymity in mobile wireless networks
* Reliability and fault tolerance in mobile wireless networks
* Secure mobile routing protocols
* Security under resource constraints
* Performance and security trade-offs in mobile wireless networks
* Intrusion detection in mobile wireless networks
* Secure mobile location services
* Denial of service in mobile wireless networks

Guideline for Authors:

Please submit your paper(s) in PDF format to:

Lei Shu, lei.shu@ieee.org, and
Weiwei Yuan, weiwei@oslab.khu.ac.kr

All submissions will be reviewed by the technical program committee and will
be judged by
their technical merit and relevance to workshop. Submissions should include
abstract, 5-10
keywords, and the e-mail address of the corresponding author and be in PDF
format. Each
submission must not exceed 6 pages in the IEEE ''8.5x11'' two-column format
with 10-12
point font, including tables and figures[Latex][Doc]. Submitted papers must
be original
work that has not appeared in and is not under consideration for another
conference or a
journal. At least one of the authors must attend the conference to present
the work in order
that the accepted paper can be put into digital library

IMPORTANT DATES:

Paper submission due: February 15, 2010
Acceptance notification: April 20, 2010
Camera-ready due: May 20, 2010
Author registration: May 20, 2010
Workshop: August 18-22 2010


Program Co-chairs

Lei Shu
Nishio Lab., Department of Multimedia Engineering,
Graduate School of Information Science and Technology
Osaka University, Japan

Weiwei Yuan
UC Lab, Department of Computer Engineering,
Kyung Hee University, Korea

Lei Wang
School of Software,
Dalian University of Technology, China

Donghai Guan
UC Lab, Department of Computer Engineering,
Kyung Hee University, Korea

Publicity Chair

Kai Lin
Dalian University of Technology, China
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc

1 comment:

sam59527 said...

sangambayard-c-m.com