ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SelfNet 2012 - International Workshop on Security in Self-Organizing Networks (SelfNet'12)



VenueTrivandrum, India India



Topics/Call fo Papers

International Workshop on Security in Self-Organizing Networks (SelfNet'12)
11-12 October 2012, Trivandrum, India
co-located with
International Conference on Security in Computer Networks and Distributed Systems (SNDS'12)
SelfNet'12 invites submissions containing original ideas that are relevant to the scope of the conference. The manuscripts should be submitted in PDF format.Authors should submit their papers online. We use EDAS system for submission of papers and review process.
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email.
Conference proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in ISI Proceedings, Scopus, EI and DBLP. The Proceedings will also be included in the CCIS electronic book series hosted in the SpringerLink digital library.
Topics of interest include but not limited to:
Authentication mechanisms
Capacity planning and admission control
Charging and secure payment
Cooperation and mitigating non-cooperative behavior
Cross-layer security
Cryptographic primitives for wireless communication
Delay tolerant networks, Opportunistic networks
Economics of wireless security
Energy-efficient protocols for wireless networks
Identity theft and phishing
Incentive-aware secure protocol design
Intrusion, attack and malicious behavior detection
Jamming and anti-jamming security protocols
Key management and trust establishment
MAC and routing protocols
Mobility patterns, location and handoff management
Monitoring and surveillance, Optimization models and algorithms
Power aware and energy efficient design
Privacy and anonymity
Quantitative evaluation of wireless system security
Resilient virtual infrastructures
Resource Management
Secure localization and positioning, Secure PHY and MAC protocols
Secure services (neighbor discovery, localization, etc.)
Security and performance tradeoff
Self-awareness and context-awareness
User and location privacy
Vulnerabilities, attacks and countermeasures
Wireless threat modeling and security analysis
Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journals:
International Journal of Trust Management in Computing and Communications (IJTMCC), ISSN (Online): 2048-8386 - ISSN (Print): 2048-8378, Inder Science Publishers, Switzerland
Key Dates
Full Paper Submission Ends: June 20, 2012
Acceptance Notification:22 July 2012
Final paper Deadline: July 30, 2012
Author Registration Closes: July 30, 2012
Conference: October 11-12, 2012
Contact Us
Technical Programme Committee
Zhenzhen Ye, IBM, USA
Yurong Xu, Dartmouth College, USA
Sghaier Guizani, Alfaisal University, Saudi Arabia
Ruay-Shiung Chang, National Dong Hwa University, Taiwan
Periklis Chatzimisios, Alexander TEI of Thessaloniki, Greece
Nakjung Choi, Alcatel-Lucent, Bell-Labs, Korea
Michael Lauer, Vanille-Media, Germany
Maytham Safar, Kuwait University, Kuwait
Liza A. Latiff, University Technology Malaysia, Malaysia
Kyoung-Don Kang, State University of New York, Binghamton, USA
Giuseppe Ruggeri, University "Mediterranea" of Reggio Calabria, Italy
Giannis Marias, Athens University of Economics and Business, Greece
George Karagiannidis, Aristotle University of Thessaloniki, Greece
Adel Ali, University Technology Malaysia, Malaysia
Abdelouahid Derhab, CERIST, Algeria.

Last modified: 2012-06-13 07:28:25