MWNS 2010 - The First International Workshop on Mobile, Wireless & Networks Security (MWNS-2010)In conjunction with (CNSA 2010)
Topics/Call fo Papers
1st International workshop on on Mobile, Wireless & Networks Security (MWNS-2010) w ill provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of mobile & wireless network security. Original papers are invited on wireless, senso r & mobile network security issues. The aim of the workshop is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Topic of Interest
Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to
?Security under resource constraints
?Performance and security tradeoffs
?Secure roaming across administrative domains
?Key management
?Cryptographic Protocols
?Authentication and access control
?Trust establishment, negotiation, and management
?Intrusion detection and tolerance
?Secure location services
?Privacy and anonymity
?Secure routing
?Secure MAC protocols
?DoS & other security threats & Countermeasures.
?Secure clock distribution.
?Prevention of traffic analysis.
?Security for embedded systems
?Securing wireless & mobile applications
?Security and Privacy features into Mobile and Wearable devices
?Sensor Networks Security
?Wireless Ad Hoc Networks Security
?Trust establishment
?Vulnerability modeling and threat analysis
?Security & privacy in RFID systems
Topic of Interest
Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to
?Security under resource constraints
?Performance and security tradeoffs
?Secure roaming across administrative domains
?Key management
?Cryptographic Protocols
?Authentication and access control
?Trust establishment, negotiation, and management
?Intrusion detection and tolerance
?Secure location services
?Privacy and anonymity
?Secure routing
?Secure MAC protocols
?DoS & other security threats & Countermeasures.
?Secure clock distribution.
?Prevention of traffic analysis.
?Security for embedded systems
?Securing wireless & mobile applications
?Security and Privacy features into Mobile and Wearable devices
?Sensor Networks Security
?Wireless Ad Hoc Networks Security
?Trust establishment
?Vulnerability modeling and threat analysis
?Security & privacy in RFID systems
Other CFPs
- THE THIRD INTERNATIONAL WORKSHOP ON DATABASE MANAGEMENT SYSTEMS (DMS-2012)
- The Third International workshop on Ad Hoc, Sensor & Ubiquitous Computing (ASUC-2012)
- The Fifth International Conference on Network Security & Applications (CNSA-2012)
- 1st Int'l Workshop on Software Architectures for Intelligent Environments
- The 2nd IEEE International Workshop on Software Test Automation (STA 2010)
Last modified: 2010-06-04 19:32:22