| |||||||||||||||
IWCMC-SEC 2012 : Security Symposium at IWCMC 2012 | |||||||||||||||
Link: http://www.iwcmc.org/2012/files/CFP/CFP_TPS.pdf | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Call for Papers
TPS: Trust, Privacy and Security Symposium The 8th International Wireless Communications and Mobile Computing Conference IWCMC-2012 — http://www.iwcmc.org/2012 August 27-31, 2012, Limasol, Cyprus With the advancement of mobile computer applications and due to the proliferation of heterogeneous computer and communication networks, trust, privacy and security issues have become paramount. The development of a plethora of communication standards using different bands of the radio spectrum has refocused the research interest on mobile and wireless security. The importance of the addressed area recently has been dramatically highlighted by some successful attacks against mobile platforms. The Symposium on Trust, Privacy and Security of IWCMC 2012 is soliciting original papers on research and development topics in the field of the security of wireless networks and pervasive computing. Prospective authors are cordially invited to submit original technical papers – up to 6 pages of length. Accepted papers will be published in the conference proceedings and their authors will provide an oral presentation at IWCMC 2012 in Cyprus. Scope of the Trust, Privacy and Security Symposium includes, but is not limited to: - Application Level Trust, Privacy and Security - Architectures related to Trust, Privacy and Security - Attacks and Counter Measures in Mobile and Wireless Networks - Computer and Network Forensics - Cross-layer Design for Robustness and Security - Cryptanalysis, Lightweight Cryptographic Algorithms and Applications - Identity Management and Key Management Systems - Information System Security - Intrusion Detection and Response in Wireless Networks - Mobile Network Security - Performance Modeling and Analysis - Physical Security - Privacy and Anonymity in Contents Distribution - Privacy and Anonymity in Vehicular Networks and Clouds - Protocols, Simulation, Experiments - Security in Advanced Communication Technologies, as Cognitive Radio and Cooperative Communication - Security of Mesh Networks - Security of Mobile Multimedia Transmission - Security of Wireless Sensor Networks - Threat and Vulnerability Analysis for Mobile Communication Original manuscripts of previously unpublished work, which are currently not under review in any form, should be submitted electronically via http://www.edas.info/newPaper.php?c=11223&track=17887. For more comprehensive information, please see http://www.iwcmc.org/2012. Important Dates: - Full Paper Submission: December 19, 2011 - Paper Acceptance Notification: March 25, 2012 - Camera-Ready Paper Submission: April 30, 2012 - Registration Deadline for Authors: April 30, 2012 Symposium Chairs: Mohamed Hamdi, Carthage University, Tunisia Zhou Su, Waseda University, Japan Michele Nogueira, University of Parana, Brasil Peter Mueller, IBM Zurich Research Laboratory, Switzerland |
|