Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us

    SECPRIWIMOB 2009 - 2nd International Workshop on Security and Privacy in Wireless & Mobile Computing, Networking & Communications 2009 (SecPriWiMob 2009)

    View: 1787

    Website http://www.icsd.aegean.gr/SecPri_WiMob_2009/default.htm | Want to Edit it Edit Freely

    Category SECPRIWIMOB 2009

    Deadline: June 07, 2009 | Date: October 12, 2009

    Venue/Country: Marrakech, Morocco

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    2nd International Workshop on Security and Privacy in Wireless & Mobile Computing, Networking & Communications 2009 (SecPriWiMob 2009)

    http://www.icsd.aegean.gr/SecPri_WiMob_2009/default.htm

    In conjunction with

    WiMob 2009

    Marrakech, Morocco

    October 12th-14th, 2009

    http://conferences.computer.org/wimob2009/

    Scope

    Wireless and Mobile communication networks offer organizations and users

    several

    benefits, such as portability, mobility and flexibility, while increasing

    everyday

    business productivity, and reducing installation cost. Wireless Local Area

    Networks,

    for instance, have been used in various environments, such as business,

    home,

    conference centers, airports and many more, allowing users to move from

    place to

    place, avoiding cabling restrictions and without being disconnected from

    the network.

    Ad Hoc Networks are collections of wireless computers communicating among

    themselves

    over possibly multihop paths, without the help of any infrastructure such

    as base

    stations or access points; these networks allow data synchronization with

    network

    systems and application sharing between devices. Mobile Ad Hoc Networks

    are autonomous

    collection of mobile entities that communicate over relatively bandwidth

    constrained

    wireless links, establishing survivable, efficient, dynamic communication

    for emergency

    operations. Wireless Ad Hoc Sensor Networks consist of a number of sensors

    spread

    across a geographical area, offering certain capabilities and enhancements

    in

    operational efficiency in civilian applications, as well as assisting in

    international

    effort to increase alertness to potential threats.

    However, although Wireless and Mobile communication environments eliminate

    many of the

    problems associated with traditional wired networks, the new security and

    privacy risks

    introduced by such environments need to be reduced by exploiting

    appropriate security

    measures and safeguards, ensuring an acceptable level of overall residual

    hazard.

    The objectives of the SecPri_WiMob 2009 Workshop are to bring together

    researchers from

    research communities in Wireless and Mobile Computing, Networking and

    Communications,

    Security and Privacy, with the goal of fostering interaction

    Topics of Interest

    We welcome the submission of papers from the full spectrum of issues

    related with Security

    and Privacy in Wireless and Mobile Computing, Networking and

    Communications. Papers may

    focus on protocols, architectures, methods, technologies, applications,

    practical experiences,

    simulation results and analysis, theory and validation on topics include,

    but not limited to:

    - Cryptographic Protocols for Mobile &Wireless Networks

    - Key Management in Mobile &Wireless Computing

    - Reasoning about Security & Privacy

    - Privacy and Anonymity in Mobile & Wireless Computing

    - Public Key Infrastructure in Mobile & Wireless Environments

    - Security under Resource Constraints

    - Security Architectures and Protocols in Wireless LANs

    - Economics of Security &Privacy in Wireless & Mobile environments

    - Security Architectures and Protocols in B3G/4G Mobile Networks

    - Ad hoc Networks Security

    - Security and Privacy features into Mobile & Wearable devices

    - Sensor Networks Security

    - Wireless Ad Hoc Networks Security

    - Role of Sensors to Enable Security

    - Trust Establishment, Negotiation, &Management

    - Security and Privacy in Pervasive Computing

    - Location Privacy

    Important Dates

    Paper submission due: June 7, 2009

    Paper acceptance notification: July 26, 2009

    Final manuscript due: August 10, 2009

    Registration: August 20, 2009

    Workshop: October 12, 2009

    Paper Submission

    Submitted papers must represent original material that is not currently

    under review in

    any other conference or journal, and has not been previously published.

    Paper length

    should not exceed five-page technical paper manuscript. Please see author

    information

    page for submission guidelines at WiMob 2009 website

    (http://conferences.computer.org/wimob2009/WorkshopsSymposia.html). Papers

    should be

    submitted in a PDF format through EDAS.

    Submissions should include a cover page with authors' names, affiliations,

    fax and

    telephone numbers and e-mail addresses. All accepted papers will be

    published in the

    conference proceedings. At least one author of accepted papers is required

    to register

    at the full registration rate.

    Contact

    Stefanos Gritzalis (sgritz(at)aegean.gr)


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.