posted by user: x50x4d || 6822 views || tracked by 7 users: [display]

IWCMC15-Security 2015 : IWCMC'15 - Trust, Privacy and Security Symposium

FacebookTwitterLinkedInGoogle

Link: http://iwcmc.org/2015/
 
When Aug 24, 2015 - Aug 27, 2015
Where Durbovnik, Croatia
Submission Deadline Mar 2, 2015
Notification Due Apr 15, 2015
Final Version Due May 10, 2015
Categories    security   wireless   mobile   smartphone
 

Call For Papers

Call for Papers

Trust, Privacy and Security Symposium

The 11th International Wireless Communications & Mobile Computing Conference

IWCMC’15 Website: http://iwcmc.org/2015/
Submission Link: https://edas.info/newPaper.php?c=17297
Valamar Lacroma Hotels & Resorts, Dubrovnik, Croatia, August 24-27, 2015

Technically sponsored by IEEE, IEEE Croatia Section
Local sponsor: University of Dubrovnik, Croatia


Symposium Co-Chairs:
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Yuli Yang, Meliksah University, Kayseri, Turkey


Scope:
With the advancement of mobile computer applications and due to the proliferation
of heterogeneous computer and communication networks, trust, privacy and security
issues have become paramount. The development of a plethora of communication
standards using different spectrum bands has refocused the research interests on
mobile and wireless security. Recently, the importance of the addressed area has
been dramatically highlighted by some successful attacks against mobile platforms.
The Symposium on Trust, Privacy and Security of IWCMC 2015 is soliciting original
papers on research and development topics in the field of the security of wireless
networks and pervasive computing. Prospective authors are cordially invited to
submit original technical papers up to 6 pages of length. Accepted papers will be
published in the conference proceedings and will be submitted to the IEEE digital
library (IEEE Xplore). The authors will provide an oral presentation at IWCMC 2015
in Dubrovnik.
Topics of interest include, but are not limited to:

- Application Level Trust, Privacy and Security
- Architectures related to Trust, Privacy and Security
- Attacks and Counter Measures in Mobile and Wireless Networks
- Big Data Security and Privacy
- Computer and Network Forensics
- Cross-layer Design for Robustness and Security
- Cryptanalysis, Lightweight Cryptographic Algorithms and Applications
- Data Center Security
- Formal Trust Models, Security Modeling and Protocol Design
- Identity Management and Key Management Systems
- Information System Security
- Intrusion Detection and Response in Wireless Networks
- Key distribution and management
- Location-based services and their security and privacy aspects
- Mobile and Wireless Network Security
- Network Public Opinion Analysis and Monitoring
- Network Security Metrics and Their Performance Evaluation
- Online Social Networks and Their Security Aspects
- Physical Layer Security
- Privacy and Security in Clouds and Contents Distribution Networks
- Privacy in Location-based Services
- Privacy and Anonymity in Vehicular Networks
- Resource Allocation, Incentives, and Game-Theoretic Approaches
- Security in Cognitive Radio Networks and Cooperative Communication Systems
- Security of Mesh Networks
- Security of Mobile Multimedia and Cloud Media
- Security of Wireless Sensor Networks
- Security of Cyber Physical Systems
- Smart Phone Security
- Threat and Vulnerability Analysis for Mobile Communication


Submission Guidelines:
Prospective authors are invited to submit original technical papers, up to 6 pages
of length, using the EDAS link:
https://edas.info/newPaper.php?c=17319

Selected papers will be considered for possible publication in a special issue in
one of the following Journals.
(For more information, please visit: http://iwcmc.org/2015)

1. Wiley Journal of Wireless Communications and Mobile Computing (WCMC)
2. International Journal of Sensor Networks (IJSNet)
3. The International Journal of Autonomous and Adaptive Communications Systems (IJAACS)
4. KSII Transactions on Internet and Information Systems
5. Peer-to-Peer Networking & Applications

Note: There will be a best paper award, best Symposium award and best Workshop award.


Important Dates:
Submission: March 02, 2015 (extended)
Acceptance notification: April 15, 2015
Camera-ready paper submissions: May 10, 2015
Registration deadline for authors: May 10, 2015

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
IJWMN 2024   International Journal of Wireless & Mobile Networks -- ERA, WJCI Indexed, H index 37
ICISPP 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)