CWECS 2012 - Third International Workshop on Cloud, Wireless and e-Commerce Security (CWECS-2012)
Topics/Call fo Papers
In the last few years, due to increase in number of Cloud computing, Wireless network and E-Commerce (CWEC) applications and studies, the security issues and pivotal challenges include integrity verification, authentication, access control, attack prevention, etc., are also increasing. Recently, security technologies are booming. However, to achieve the whole security target for Cloud computing, wireless network and e-commerce, it requires much more than the mere application of current core technologies. The main purpose of this workshop is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Security Technology in Cloud computing, wireless network and e-commerce, particularly aiming to promote state-of-the-art research in this area.
Topics (included, but are not limited to)
- Handover Security
- Network Mobility Security
- VoIP Security
- Mobile Agent Security
- Wireless Grid Security
- RFID Security
- Cell Phone, PDA and Potable Device Security
- Mobile, Ad Hoc and Sensor Network Security
- 3G ~ 4G Communication Security
- Access Control, Authentication and Authorization for CWEC
- Cryptography, Cryptanalysis and Digital Signatures for CWEC
- Key Management and Recovery for CWEC
- Trust Negotiation, Establishment and Management for CWEC
- Network Management for CWEC
- Performance Evaluation for CWEC
- Privacy, Data Integrity and Data Protection for CWEC
- Computer Forensics for CWEC
- Security Threats and Countermeasures for CWEC
- Cross-layer Design for CWEC
Topics (included, but are not limited to)
- Handover Security
- Network Mobility Security
- VoIP Security
- Mobile Agent Security
- Wireless Grid Security
- RFID Security
- Cell Phone, PDA and Potable Device Security
- Mobile, Ad Hoc and Sensor Network Security
- 3G ~ 4G Communication Security
- Access Control, Authentication and Authorization for CWEC
- Cryptography, Cryptanalysis and Digital Signatures for CWEC
- Key Management and Recovery for CWEC
- Trust Negotiation, Establishment and Management for CWEC
- Network Management for CWEC
- Performance Evaluation for CWEC
- Privacy, Data Integrity and Data Protection for CWEC
- Computer Forensics for CWEC
- Security Threats and Countermeasures for CWEC
- Cross-layer Design for CWEC
Other CFPs
- Second International Workshop on Diagnosis of Complex Systems (DCS-2011)
- Second International Workshop on Methods, Analysis and Protocols for Wireless Communication (MAPWC-2011)
- Second International Workshop on Intelligent Sensors and Smart Environments (ISSE-2011)
- Second International Workshop on Recent Innovations and Breakthroughs in Cryptography (RIBC-2011)
- Third International Workshop on Network Traffic Control, Analysis and Applications (NTCAA-2011)
Last modified: 2012-02-22 17:49:26