SelfNet 2014 - Second International Workshop on Security in Self-Organizing Networks (SelfNet'14)
Topics/Call fo Papers
Second International Workshop on Security in Self-Organizing Networks (SelfNet'14)
13-14 March 2014, Trivandrum, India
co-located with
Second International Conference on Security in Computer Networks and Distributed Systems (SNDS'12)
http://www.iiitmk.ac.in/snds/wt.html
CALL FOR PAPERS
-------------------------
SelfNet'14 invites submissions containing original ideas that are relevant to the scope of the conference. The manuscripts should be submitted in PDF format.Authors should submit their papers online. We use EDAS system for submission of papers and review process.
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email.
Conference proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in ISI Proceedings, Scopus, EI and DBLP. The Proceedings will also be included in the CCIS electronic book series hosted in the SpringerLink digital library.
Topics of interest include but not limited to:
Authentication mechanisms
Capacity planning and admission control
Charging and secure payment
Cooperation and mitigating non-cooperative behavior
Cross-layer security
Cryptographic primitives for wireless communication
Delay tolerant networks, Opportunistic networks
Economics of wireless security
Energy-efficient protocols for wireless networks
Identity theft and phishing
Incentive-aware secure protocol design
Intrusion, attack and malicious behavior detection
Jamming and anti-jamming security protocols
Key management and trust establishment
MAC and routing protocols
Mobility patterns, location and handoff management
Monitoring and surveillance, Optimization models and algorithms
Power aware and energy efficient design
Privacy and anonymity
Quantitative evaluation of wireless system security
Resilient virtual infrastructures
Resource Management
Secure localization and positioning, Secure PHY and MAC protocols
Secure services (neighbor discovery, localization, etc.)
Security and performance tradeoff
Self-awareness and context-awareness
User and location privacy
Vulnerabilities, attacks and countermeasures
Wireless threat modeling and security analysis
Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journals:
International Journal of Trust Management in Computing and Communications (IJTMCC), ISSN (Online): 2048-8386 - ISSN (Print): 2048-8378, Inder Science Publishers, Switzerland
Key Dates
------------
Full Paper Submission Ends:November 10, 2013
Acceptance Notification:December 15, 2013
Final paper Deadline:December 31, 2013
Author Registration Closes:January 5, 2014
Technical Programme Committee
------------------------------------
Program Chair
Al-Sakib Khan Pathan, IIUM, Malaysia
TPC Members
George Karagiannidis, Aristotle University of Thessaloniki, Greece
Nakjung Choi, Bell-Labs, Alcatel-Lucent, Korea
Abdelouahid Derhab, CERIST, Algeria
Yurong Xu, Dartmouth College, USA
Deepak Karia, Mumbai University PG Teacher, India
C-F Cheng, National Chiao Tung University, Taiwan
N V S N Sarma, National Institute of Technology Warangal, India
Ravi Kodali, National Institute of Technology, Warangal, India
Rama Rao T, SRM University, India
Kyoung-Don Kang, State University of New York, Binghamton, USA
Axel Sikora, University of Applied Sciences Offenburg, Germany
Rui Aguiar, University of Aveiro, Portugal
Sameer Tilak, University of California at San Diego, USA
Kamran Arshad, University of Greenwich, United Kingdom
Junichi Suzuki, University of Massachusetts, Boston, USA
Giuseppe Ruggeri, University of Reggio Calabria, Italy
Liza A. Latiff, University Technology Malaysia, Malaysia
Michael Lauer, Vanille-Media, Germany
Contact Us
------------
Email: snds2014.iiitmk-AT-gmail.com.
13-14 March 2014, Trivandrum, India
co-located with
Second International Conference on Security in Computer Networks and Distributed Systems (SNDS'12)
http://www.iiitmk.ac.in/snds/wt.html
CALL FOR PAPERS
-------------------------
SelfNet'14 invites submissions containing original ideas that are relevant to the scope of the conference. The manuscripts should be submitted in PDF format.Authors should submit their papers online. We use EDAS system for submission of papers and review process.
All papers that conform to submission guidelines will be peer reviewed and evaluated based on originality, technical and/or research content/depth, correctness, relevance to conference, contributions, and readability. Acceptance of papers will be communicated to authors by email.
Conference proceedings will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. CCIS is abstracted/indexed in ISI Proceedings, Scopus, EI and DBLP. The Proceedings will also be included in the CCIS electronic book series hosted in the SpringerLink digital library.
Topics of interest include but not limited to:
Authentication mechanisms
Capacity planning and admission control
Charging and secure payment
Cooperation and mitigating non-cooperative behavior
Cross-layer security
Cryptographic primitives for wireless communication
Delay tolerant networks, Opportunistic networks
Economics of wireless security
Energy-efficient protocols for wireless networks
Identity theft and phishing
Incentive-aware secure protocol design
Intrusion, attack and malicious behavior detection
Jamming and anti-jamming security protocols
Key management and trust establishment
MAC and routing protocols
Mobility patterns, location and handoff management
Monitoring and surveillance, Optimization models and algorithms
Power aware and energy efficient design
Privacy and anonymity
Quantitative evaluation of wireless system security
Resilient virtual infrastructures
Resource Management
Secure localization and positioning, Secure PHY and MAC protocols
Secure services (neighbor discovery, localization, etc.)
Security and performance tradeoff
Self-awareness and context-awareness
User and location privacy
Vulnerabilities, attacks and countermeasures
Wireless threat modeling and security analysis
Authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in the following Journals:
International Journal of Trust Management in Computing and Communications (IJTMCC), ISSN (Online): 2048-8386 - ISSN (Print): 2048-8378, Inder Science Publishers, Switzerland
Key Dates
------------
Full Paper Submission Ends:November 10, 2013
Acceptance Notification:December 15, 2013
Final paper Deadline:December 31, 2013
Author Registration Closes:January 5, 2014
Technical Programme Committee
------------------------------------
Program Chair
Al-Sakib Khan Pathan, IIUM, Malaysia
TPC Members
George Karagiannidis, Aristotle University of Thessaloniki, Greece
Nakjung Choi, Bell-Labs, Alcatel-Lucent, Korea
Abdelouahid Derhab, CERIST, Algeria
Yurong Xu, Dartmouth College, USA
Deepak Karia, Mumbai University PG Teacher, India
C-F Cheng, National Chiao Tung University, Taiwan
N V S N Sarma, National Institute of Technology Warangal, India
Ravi Kodali, National Institute of Technology, Warangal, India
Rama Rao T, SRM University, India
Kyoung-Don Kang, State University of New York, Binghamton, USA
Axel Sikora, University of Applied Sciences Offenburg, Germany
Rui Aguiar, University of Aveiro, Portugal
Sameer Tilak, University of California at San Diego, USA
Kamran Arshad, University of Greenwich, United Kingdom
Junichi Suzuki, University of Massachusetts, Boston, USA
Giuseppe Ruggeri, University of Reggio Calabria, Italy
Liza A. Latiff, University Technology Malaysia, Malaysia
Michael Lauer, Vanille-Media, Germany
Contact Us
------------
Email: snds2014.iiitmk-AT-gmail.com.
Other CFPs
- ACM International Conference on Interactive Experiences for TV and Online Video
- 7th International Workshop on Information Filtering and Retrieval
- Canadian Conference on Computer and Robot Vision
- 13th International Symposium on Web and Wireless Geographical Information Systems
- The Fifth Augmented Human International Conference
Last modified: 2013-09-08 21:56:27