posted by user: menezes || 6804 views || tracked by 6 users: [display]

M2MSec 2014 : First International Workshop on Security and Privacy in Machine-to-Machine Communications

FacebookTwitterLinkedInGoogle

Link: http://www.m2m-sec.org/
 
When Oct 29, 2014 - Oct 29, 2014
Where San Francisco, CA, USA
Submission Deadline Jun 1, 2014
Notification Due Jul 1, 2014
Final Version Due Jul 11, 2014
Categories    m2m communication   security   privacy   trust
 

Call For Papers

M2MSec 2014 First International Workshop on Security and Privacy in Machine-to-Machine Communications, San Francisco, CA, USA, October 29, 2014. (Submissions due 1 June 2014)

The First International Workshop on Security and Privacy in Machine-to-Machine Communications (M2MSec'14) aims to foster innovative research and discuss about security and privacy challenges, solutions, implementations, and standardization in emerging M2M communication systems. M2MSec'14 takes place on October 29, 2014 in San Francisco, USA in conjunction with IEEE Conference on Communications and Network Security (CNS'14). Papers from academic researchers, industry practitioners, and government institutions offering novel research contributions in all theoretical and practical aspects of security and privacy in M2M communications are solicited for submission to M2MSec'14.

The scope of this workshop covers all aspects of security and privacy in M2M communications and particular topics of interest include, but are not limited to:
- Threat and vulnerability analysis in M2M communications
- Attacks and countermeasures in M2M communications
- System architecture for security and privacy in M2M communications
- Physical layer security in M2M communications
- Cross layer design for security and privacy in M2M communications
- Security and privacy in smart grid, RFID, near field communications (NFC), bluetooth, wireless sensor networks, body area networks, e-health, vehicular ad-hoc networks
- Lightweight cryptographic primitives and protocols
- Trust and assurance in M2M communications
- Hardware security module and platform for M2M communications
- Identity and credential management in M2M communications
- Standardization for M2M communications
- Cloud computing and M2M communications
- Device-to-Device (D2D) networks such as LTE-direct
- Pervasive sensing Networks, including mobile crowdsourcing, participatory sensing
- Novel attacks resulting in IoT environments
- Data mining, cleaning and analysis techniques for IoT
- Real world deployment and experiences
- Prototype IoT systems and applications

For more information, please see http://www.m2m-sec.org/.

Related Resources

Ei/Scopus-ITCC 2026   2026 6th International Conference on Information Technology and Cloud Computing (ITCC 2026)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Ei/Scopus-CEICE 2026   2026 3rd International Conference on Electrical, Information and Communication Engineering (CEICE 2026)
IOTSEC 2025   2nd International Conference on IoT & Information Security
AMLDS 2026   IEEE--2026 2nd International Conference on Advanced Machine Learning and Data Science
EI/Scopus-ICDSIC 2025   2025 International Conference on Digital Society and Intelligent Computing-EI/Scopus
Ei/Scopus-CNIOT 2026   2026 7th IEEE International Conference on Computing, Networks and Internet of Things (CNIOT 2026)
ENERGY 2025   3rd International Conference on Energy
Ei/Scopus-DMNLP 2026   2026 3rd International Conference on Data Mining and Natural Language Processing (DMNLP 2026)
IFSP 2026   2026 The 6th International Forum on Signal Processing (IFSP 2026)