WUMS 2014 - Workshop on Usable Mobile Security
Topics/Call fo Papers
The mobile nature of the mobile devices means they frequently operate in insecure environments, providing numerous opportunities for attackers, while simultaneously housing a wide range of confidential information such as e-mails, calling records, location, etc. It is particularly difficult to provide security mechanisms that are both secure and usable, given the size restrictions and usage characteristics for these devices. However, it is of crucial importance that security be usable in order to be adopted by end users.
WUMS will provide a forum in which to present the latest research in the area of usable mobile security, bringing together researchers from HCI, mobile systems, security, data analytics, and other related areas to discuss new ideas and perspectives in the design and implementation of mechanisms that are both secure and usable.
Suggested Paper Topics
- Evaluation of existing mobile security mechanisms
- User data security on mobile devices
- New secure mobile HCI interactions
- Secure localization
- Secure mobile payment
- User authentication on mobile devices
- Experience reports on deployment of mobile security features
- Loss or theft protection
- Experience with in-the-wild attacks on mobile devices
Contact Information
Please contact Charles.fleming-AT-xjtlu.edu.cn with any questions.
Papers should be approximately 6 pages in length and follow the IEEE conference format. All accepted papers will be published in IEEExplore. Please submit papers by e-mail directly to charles.fleming-AT-xjtlul.edu.cn.
WUMS will provide a forum in which to present the latest research in the area of usable mobile security, bringing together researchers from HCI, mobile systems, security, data analytics, and other related areas to discuss new ideas and perspectives in the design and implementation of mechanisms that are both secure and usable.
Suggested Paper Topics
- Evaluation of existing mobile security mechanisms
- User data security on mobile devices
- New secure mobile HCI interactions
- Secure localization
- Secure mobile payment
- User authentication on mobile devices
- Experience reports on deployment of mobile security features
- Loss or theft protection
- Experience with in-the-wild attacks on mobile devices
Contact Information
Please contact Charles.fleming-AT-xjtlu.edu.cn with any questions.
Papers should be approximately 6 pages in length and follow the IEEE conference format. All accepted papers will be published in IEEExplore. Please submit papers by e-mail directly to charles.fleming-AT-xjtlul.edu.cn.
Other CFPs
Last modified: 2014-11-03 15:47:54