SecPriWiMob 2009 - 2nd International Workshop on Security and Privacy in Wireless & Mobile Computing, Networking & Communications 2009 (SecPriWiMob 2009)
Topics/Call fo Papers
2nd International Workshop on Security and Privacy in Wireless & Mobile Computing, Networking & Communications 2009 (SecPriWiMob 2009)
http://www.icsd.aegean.gr/SecPri_WiMob_2009/defaul...
In conjunction with
WiMob 2009
Marrakech, Morocco
October 12th-14th, 2009
http://conferences.computer.org/wimob2009/
Scope
-----
Wireless and Mobile communication networks offer organizations and users
several
benefits, such as portability, mobility and flexibility, while increasing
everyday
business productivity, and reducing installation cost. Wireless Local Area
Networks,
for instance, have been used in various environments, such as business,
home,
conference centers, airports and many more, allowing users to move from
place to
place, avoiding cabling restrictions and without being disconnected from
the network.
Ad Hoc Networks are collections of wireless computers communicating among
themselves
over possibly multihop paths, without the help of any infrastructure such
as base
stations or access points; these networks allow data synchronization with
network
systems and application sharing between devices. Mobile Ad Hoc Networks
are autonomous
collection of mobile entities that communicate over relatively bandwidth
constrained
wireless links, establishing survivable, efficient, dynamic communication
for emergency
operations. Wireless Ad Hoc Sensor Networks consist of a number of sensors
spread
across a geographical area, offering certain capabilities and enhancements
in
operational efficiency in civilian applications, as well as assisting in
international
effort to increase alertness to potential threats.
However, although Wireless and Mobile communication environments eliminate
many of the
problems associated with traditional wired networks, the new security and
privacy risks
introduced by such environments need to be reduced by exploiting
appropriate security
measures and safeguards, ensuring an acceptable level of overall residual
hazard.
The objectives of the SecPri_WiMob 2009 Workshop are to bring together
researchers from
research communities in Wireless and Mobile Computing, Networking and
Communications,
Security and Privacy, with the goal of fostering interaction
Topics of Interest
------------------
We welcome the submission of papers from the full spectrum of issues
related with Security
and Privacy in Wireless and Mobile Computing, Networking and
Communications. Papers may
focus on protocols, architectures, methods, technologies, applications,
practical experiences,
simulation results and analysis, theory and validation on topics include,
but not limited to:
- Cryptographic Protocols for Mobile &Wireless Networks
- Key Management in Mobile &Wireless Computing
- Reasoning about Security & Privacy
- Privacy and Anonymity in Mobile & Wireless Computing
- Public Key Infrastructure in Mobile & Wireless Environments
- Security under Resource Constraints
- Security Architectures and Protocols in Wireless LANs
- Economics of Security &Privacy in Wireless & Mobile environments
- Security Architectures and Protocols in B3G/4G Mobile Networks
- Ad hoc Networks Security
- Security and Privacy features into Mobile & Wearable devices
- Sensor Networks Security
- Wireless Ad Hoc Networks Security
- Role of Sensors to Enable Security
- Trust Establishment, Negotiation, &Management
- Security and Privacy in Pervasive Computing
- Location Privacy
Important Dates
---------------
Paper submission due: June 7, 2009
Paper acceptance notification: July 26, 2009
Final manuscript due: August 10, 2009
Registration: August 20, 2009
Workshop: October 12, 2009
Paper Submission
----------------
Submitted papers must represent original material that is not currently
under review in
any other conference or journal, and has not been previously published.
Paper length
should not exceed five-page technical paper manuscript. Please see author
information
page for submission guidelines at WiMob 2009 website
(http://conferences.computer.org/wimob2009/Workshop...). Papers
should be
submitted in a PDF format through EDAS.
Submissions should include a cover page with authors' names, affiliations,
fax and
telephone numbers and e-mail addresses. All accepted papers will be
published in the
conference proceedings. At least one author of accepted papers is required
to register
at the full registration rate.
Contact
-------
Stefanos Gritzalis (sgritz(at)aegean.gr)
http://www.icsd.aegean.gr/SecPri_WiMob_2009/defaul...
In conjunction with
WiMob 2009
Marrakech, Morocco
October 12th-14th, 2009
http://conferences.computer.org/wimob2009/
Scope
-----
Wireless and Mobile communication networks offer organizations and users
several
benefits, such as portability, mobility and flexibility, while increasing
everyday
business productivity, and reducing installation cost. Wireless Local Area
Networks,
for instance, have been used in various environments, such as business,
home,
conference centers, airports and many more, allowing users to move from
place to
place, avoiding cabling restrictions and without being disconnected from
the network.
Ad Hoc Networks are collections of wireless computers communicating among
themselves
over possibly multihop paths, without the help of any infrastructure such
as base
stations or access points; these networks allow data synchronization with
network
systems and application sharing between devices. Mobile Ad Hoc Networks
are autonomous
collection of mobile entities that communicate over relatively bandwidth
constrained
wireless links, establishing survivable, efficient, dynamic communication
for emergency
operations. Wireless Ad Hoc Sensor Networks consist of a number of sensors
spread
across a geographical area, offering certain capabilities and enhancements
in
operational efficiency in civilian applications, as well as assisting in
international
effort to increase alertness to potential threats.
However, although Wireless and Mobile communication environments eliminate
many of the
problems associated with traditional wired networks, the new security and
privacy risks
introduced by such environments need to be reduced by exploiting
appropriate security
measures and safeguards, ensuring an acceptable level of overall residual
hazard.
The objectives of the SecPri_WiMob 2009 Workshop are to bring together
researchers from
research communities in Wireless and Mobile Computing, Networking and
Communications,
Security and Privacy, with the goal of fostering interaction
Topics of Interest
------------------
We welcome the submission of papers from the full spectrum of issues
related with Security
and Privacy in Wireless and Mobile Computing, Networking and
Communications. Papers may
focus on protocols, architectures, methods, technologies, applications,
practical experiences,
simulation results and analysis, theory and validation on topics include,
but not limited to:
- Cryptographic Protocols for Mobile &Wireless Networks
- Key Management in Mobile &Wireless Computing
- Reasoning about Security & Privacy
- Privacy and Anonymity in Mobile & Wireless Computing
- Public Key Infrastructure in Mobile & Wireless Environments
- Security under Resource Constraints
- Security Architectures and Protocols in Wireless LANs
- Economics of Security &Privacy in Wireless & Mobile environments
- Security Architectures and Protocols in B3G/4G Mobile Networks
- Ad hoc Networks Security
- Security and Privacy features into Mobile & Wearable devices
- Sensor Networks Security
- Wireless Ad Hoc Networks Security
- Role of Sensors to Enable Security
- Trust Establishment, Negotiation, &Management
- Security and Privacy in Pervasive Computing
- Location Privacy
Important Dates
---------------
Paper submission due: June 7, 2009
Paper acceptance notification: July 26, 2009
Final manuscript due: August 10, 2009
Registration: August 20, 2009
Workshop: October 12, 2009
Paper Submission
----------------
Submitted papers must represent original material that is not currently
under review in
any other conference or journal, and has not been previously published.
Paper length
should not exceed five-page technical paper manuscript. Please see author
information
page for submission guidelines at WiMob 2009 website
(http://conferences.computer.org/wimob2009/Workshop...). Papers
should be
submitted in a PDF format through EDAS.
Submissions should include a cover page with authors' names, affiliations,
fax and
telephone numbers and e-mail addresses. All accepted papers will be
published in the
conference proceedings. At least one author of accepted papers is required
to register
at the full registration rate.
Contact
-------
Stefanos Gritzalis (sgritz(at)aegean.gr)
Other CFPs
- The International Workshop on Distributed Systems: Operations and Management (DSOM)
- 2012 IEEE Symposium on Industrial Electronics & Applications (ISIEA 2012)
- Special Track Cognitive Radio and Software Defined Radio: Technical, Application, Economic, Environmental, and Regulatory Aspects
- The 1st International Workshop on Aware Computing (IWAC09)
- 2009 International Workshop on Cross-layer Design in Wireless Mobile Ad hoc Networks
Last modified: 2010-06-04 19:32:22