ACM WISEC 10 2010 - The Third ACM Conference on Wireless Network Security ACM WiSec 2010
View: 4996
Website http://www.sigsac.org/wisec/WiSec2010 |
Edit Freely
Category ACM WISEC 10 2010
Deadline: September 21, 2009 | Date: March 22, 2010
Venue/Country: Hoboken, U.S.A
Updated: 2010-06-04 19:32:22 (GMT+9)
Call For Papers - CFP
The Third ACM Conference on Wireless Network SecurityACM WiSec '10March 22-24, 2010Stevens Institute of Technology, Hoboken, NJ, USAhttp://www.sigsac.org/wisec/WiSec2010*** CALL FOR PAPERS ***As wireless networks become ubiquitous, their security gains inimportance. The ACM Conference on Wireless Network Security (WiSec) aimsat exploring attacks on wireless networks as well as techniques to thwartthem. The considered networks encompass cellular, metropolitan, localarea, vehicular, ad hoc, satellite, underwater, cognitive radio, andsensor networks, as well as RFID.ACM WiSec results from the merger of three workshops: ESAS (EuropeanWorkshop on the Security of Ad Hoc and Sensor Networks), SASN (ACMWorkshop on the Security of Ad Hoc and Sensor Networks) and WiSe (ACMWorkshop on Wireless Security).The proceedings will be published by the ACM.Important Dates:Submission due: September 21, 2009Notification of acceptance: November 30, 2009Camera-ready version due: January 6, 2010Conference: March 22-24, 2010Topics of interest include, but are not limited to:* Naming and addressing vulnerabilities* Key management in wireless/mobile environments* Secure neighbor discovery / Secure localization* Secure PHY and MAC protocols* Trust establishment* Intrusion detection, detection of malicious behavior* Revocation of malicious parties* Denial of service* User privacy, location privacy* Anonymity, prevention of traffic analysis* Identity theft and phishing in mobile networks* Charging* Cooperation and prevention of non-cooperative behavior* Economics of wireless security* Vulnerability and attack modeling* Incentive-aware secure protocol design* Jamming/Anti-jamming communication* Cross-layer design for security* Monitoring and surveillance* Cryptographic primitives for wireless communication* Formal methods for wireless security* Mobile platform and systems (OS and application) securityGeneral Chair:Susanne Wetzel Stevens Institute of Technology, USAProgram Committee Co-chairs:Cristina Nita-Rotaru Purdue University, USAFrank Stajano University of Cambridge, UKPublicity Chair:Reza Curtmola New Jersey Institute of Technology, USAWeb/Publication Chair:Jing Dong Purdue Univeristy, USASteering Committee:Jean-Pierre Hubaux, EPFL, Switzerland (chair)Claude Castelluccia, INRIA, FranceDouglas Maughan, DHS/HSARPA, USAAdrian Perrig, Carnegie Mellon University, USANitin Vaidya, University of Illinois, USADirk Westhoff, NEC Europe Network Lab, GermanyLevente Buttyan, BME, HungaryVirgil Gligor, Carnegie Mellon University, USAPeng Ning, North Carolina State University, USARadha Poovendran, University of Washington, USACliff Wang, Army Research Office, USA
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.