ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

MCNCS 2014 - The 4th International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS-2014)

Date2014-07-02 - 2014-07-04

Deadline2013-12-15

VenueBirmingham City Univ, UK - United Kingdom UK - United Kingdom

Keywords

Websitehttps://voyager.ce.fit.ac.jp/conf/imis/2014

Topics/Call fo Papers

Due to increase in number of mobile, ubiquitous, cloud, network and communication applications & studies, the security issues and pivotal challenges include integrity verification, authentication, access control, attack prevention, etc., are also increasing. Recently, security technologies are booming. However, to achieve the whole security target for above-mentioned Computing and technologies, it requires much more than the mere applications of current core technologies. The main purpose of this workshop is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Security Technology in Mobile Commerce, Cloud Computing, Network and Communication, particularly aiming to promote state-of-the-art research in these areas.
Topics
Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas of Mobile Commerce, Cloud Computing, Network and Communication Security (MCNCS), but are not limited to:
Network Mobility Security
Mobile Agent Security
Cloud Security
RFID Security
Handover Security
VoIP Security
Cell Phone, PDA and Portable Device Security
Mobile, Ad Hoc and Sensor Network Security
3G ~ 4G Communication Security
Motion Detection and Tracing
Access Control, Authentication and Authorization for MCNCS
Cryptography, Cryptanalysis and Digital Signatures for MCNCS
Key Management and Recovery for MCNCS
Trust Negotiation, Establishment and Management for MCNCS
Network Management for MCNCS
Performance Evaluation for MCNCS
Privacy, Data Integrity and Data Protection for MCNCS
Computer Forensics for MCNCS
Security Threats and Countermeasures for MCNCS
Cross-layer Design for MCNCS

Last modified: 2013-11-11 23:11:23