posted by user: pmu || 13182 views || tracked by 13 users: [display]

IWCMC-SEC 2012 : Security Symposium at IWCMC 2012

FacebookTwitterLinkedInGoogle

Link: http://www.iwcmc.org/2012/files/CFP/CFP_TPS.pdf
 
When Aug 27, 2012 - Aug 31, 2012
Where Limassol, Cyprus
Submission Deadline Dec 25, 2011
Notification Due Mar 15, 2012
Final Version Due Apr 30, 2012
Categories    security   communications   cloud   policy
 

Call For Papers

Call for Papers

TPS: Trust, Privacy and Security Symposium
The 8th International Wireless Communications and Mobile Computing Conference
IWCMC-2012 — http://www.iwcmc.org/2012
August 27-31, 2012, Limasol, Cyprus

With the advancement of mobile computer applications and due to the proliferation of
heterogeneous computer and communication networks, trust, privacy and security issues have
become paramount. The development of a plethora of communication standards using different
bands of the radio spectrum has refocused the research interest on mobile and wireless security.
The importance of the addressed area recently has been dramatically highlighted by some
successful attacks against mobile platforms.
The Symposium on Trust, Privacy and Security of IWCMC 2012 is soliciting original papers on
research and development topics in the field of the security of wireless networks and pervasive
computing. Prospective authors are cordially invited to submit original technical papers – up to 6
pages of length. Accepted papers will be published in the conference proceedings and their authors
will provide an oral presentation at IWCMC 2012 in Cyprus.

Scope of the Trust, Privacy and Security Symposium includes, but is not limited to:
- Application Level Trust, Privacy and Security
- Architectures related to Trust, Privacy and Security
- Attacks and Counter Measures in Mobile and Wireless Networks
- Computer and Network Forensics
- Cross-layer Design for Robustness and Security
- Cryptanalysis, Lightweight Cryptographic Algorithms and Applications
- Identity Management and Key Management Systems
- Information System Security
- Intrusion Detection and Response in Wireless Networks
- Mobile Network Security
- Performance Modeling and Analysis
- Physical Security
- Privacy and Anonymity in Contents Distribution
- Privacy and Anonymity in Vehicular Networks and Clouds
- Protocols, Simulation, Experiments
- Security in Advanced Communication Technologies, as Cognitive Radio and Cooperative Communication
- Security of Mesh Networks
- Security of Mobile Multimedia Transmission
- Security of Wireless Sensor Networks
- Threat and Vulnerability Analysis for Mobile Communication

Original manuscripts of previously unpublished work, which are currently not under review in any
form, should be submitted electronically via
http://www.edas.info/newPaper.php?c=11223&track=17887.
For more comprehensive information, please see http://www.iwcmc.org/2012.

Important Dates:
- Full Paper Submission: December 19, 2011
- Paper Acceptance Notification: March 25, 2012
- Camera-Ready Paper Submission: April 30, 2012
- Registration Deadline for Authors: April 30, 2012

Symposium Chairs:
Mohamed Hamdi, Carthage University, Tunisia
Zhou Su, Waseda University, Japan
Michele Nogueira, University of Parana, Brasil
Peter Mueller, IBM Zurich Research Laboratory, Switzerland

Related Resources

DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
AI-SEC 2025   AI-SEC-2025 : The 1st International Workshop on Artificial Intelligence for Cybersecurity, Open University of Catalonia, Barcelona, Spain, April 9-11 2025.
CRBL 2025   5th International Conference on Cryptography and Blockchain
IFIP SEC 2025   40th International Conference on ICT Systems Security and Privacy Protection
IEEE CNCIT 2025   2025 4th International Conference on Networks, Communications and Information Technology (CNCIT 2025)
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
ISC 2025   Information Security Conference