ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ACM WiSec 10 2010 - The Third ACM Conference on Wireless Network Security ACM WiSec 2010

Date2010-03-22

Deadline2009-09-21

VenueHoboken, USA - United States USA - United States

Keywords

Websitehttp://www.sigsac.org/wisec/WiSec2010

Topics/Call fo Papers

The Third ACM Conference on Wireless Network Security

ACM WiSec '10

March 22-24, 2010
Stevens Institute of Technology, Hoboken, NJ, USA
http://www.sigsac.org/wisec/WiSec2010
---------------------------------------------------------------------
*** CALL FOR PAPERS ***

As wireless networks become ubiquitous, their security gains in
importance. The ACM Conference on Wireless Network Security (WiSec) aims
at exploring attacks on wireless networks as well as techniques to thwart
them. The considered networks encompass cellular, metropolitan, local
area, vehicular, ad hoc, satellite, underwater, cognitive radio, and
sensor networks, as well as RFID.

ACM WiSec results from the merger of three workshops: ESAS (European
Workshop on the Security of Ad Hoc and Sensor Networks), SASN (ACM
Workshop on the Security of Ad Hoc and Sensor Networks) and WiSe (ACM
Workshop on Wireless Security).
The proceedings will be published by the ACM.

Important Dates:
Submission due: September 21, 2009
Notification of acceptance: November 30, 2009
Camera-ready version due: January 6, 2010
Conference: March 22-24, 2010

Topics of interest include, but are not limited to:

* Naming and addressing vulnerabilities
* Key management in wireless/mobile environments
* Secure neighbor discovery / Secure localization
* Secure PHY and MAC protocols
* Trust establishment
* Intrusion detection, detection of malicious behavior
* Revocation of malicious parties
* Denial of service
* User privacy, location privacy
* Anonymity, prevention of traffic analysis
* Identity theft and phishing in mobile networks
* Charging
* Cooperation and prevention of non-cooperative behavior
* Economics of wireless security
* Vulnerability and attack modeling
* Incentive-aware secure protocol design
* Jamming/Anti-jamming communication
* Cross-layer design for security
* Monitoring and surveillance
* Cryptographic primitives for wireless communication
* Formal methods for wireless security
* Mobile platform and systems (OS and application) security

General Chair:
Susanne Wetzel Stevens Institute of Technology, USA

Program Committee Co-chairs:
Cristina Nita-Rotaru Purdue University, USA
Frank Stajano University of Cambridge, UK

Publicity Chair:
Reza Curtmola New Jersey Institute of Technology, USA

Web/Publication Chair:
Jing Dong Purdue Univeristy, USA

Steering Committee:
Jean-Pierre Hubaux, EPFL, Switzerland (chair)
Claude Castelluccia, INRIA, France
Douglas Maughan, DHS/HSARPA, USA
Adrian Perrig, Carnegie Mellon University, USA
Nitin Vaidya, University of Illinois, USA
Dirk Westhoff, NEC Europe Network Lab, Germany
Levente Buttyan, BME, Hungary
Virgil Gligor, Carnegie Mellon University, USA
Peng Ning, North Carolina State University, USA
Radha Poovendran, University of Washington, USA
Cliff Wang, Army Research Office, USA

Last modified: 2010-06-04 19:32:22