Sign for Notice Everyday    注册| 登陆| 友情链接| English|

Our Sponsors


    NTMS 2012 - 5th IFIP International Conference on New Technologies, Mobility and Security

    View: 4464

    Website www.ntms-conf.org | Want to Edit it Edit Freely

    Category NTMS 2012

    Deadline: January 12, 2012 | Date: May 07, 2012-May 10, 2012

    Venue/Country: Istanbul, Turkey

    Updated: 2012-01-11 15:22:37 (GMT+9)

    Call For Papers - CFP

    (Our apologies if you receive multiple copies of this CFP)

    Fifth IFIP International Conference on

    New Technologies, Mobility and Security

    May 7 - 10, 2012, Istanbul- Turkey

    http://www.ntms-conf.org

    Technically Sponsored by IEEE, COMSOC and IFIP TC6

    All accepted papers will be published in IEEE Xplore. The best papers

    of the conference will be considered for publication in COMNET and ADHOC

    NETWORKS journals.

    Overview

    NTMS'2012 is the Fifth International Conference on New Technologies,

    Mobility and Security that will be held from 7 to 10 May 2012 in

    Istanbul, Turkey.

    NTMS'2012 aims at fostering advances in the areas of New Technologies,

    Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS,

    Network Security and E-commerce, to mention a few, and provides a

    dynamic forum for researchers, students and professionals to present

    their state-of-the-art research and development in these interesting

    areas.

    The event will be combined with tutorial sessions and workshops.

    Tutorials will precede the main program, aiming at the dissemination of

    mature knowledge and technology advances in the field. Two or more

    Workshops will immediately follow the main conference, offering the

    opportunity for a more focused exchange of ideas and presentation of on-

    going research relevant to following tracks (More information and the

    full call-for-papers can be found on the conference web):

    Track 1 : Mobility & Wireless networks

    - Beyond 3G, 4G, LTE, and WiMAX Networks

    - Wireless Local Area Networks

    - Wireless Personal Area Networks

    - Wireless Ad Hoc and Mesh Networks

    - Wireless Vehicular Networks

    - Cognitive Radio Networks

    - Satellite Networks

    - Self-organizing and Re-configurable Wireless Networks

    - Energy Efficient Wireless Sensor Network Solutions

    - Wireless MAC Protocols

    - Scheduling Techniques for Wireless Networks

    - Wireless QoS Routing Algorithms

    - Radio Resource Allocation and Management

    - Cross-layer Design and Optimization in Wireless Networks

    - Clustering, Topology Control, Coverage and Connectivity

    - Cooperation and Relaying in Wireless Networks

    - Analysis, Simulation and Performance Evaluation

    - Integration of Heterogeneous Mobile, Wireless and Wire-line Radio

    Access Networks

    - Mobility, Location Management and Handover Techniques for Wireless

    Mobile Networks

    - Multimedia over Wireless and Mobile Systems

    - Power-aware Architectures, Algorithms and Protocols for

    Wireless/Mobile Networks

    - Wireless Services and Middleware Platforms

    - Green Radio Communications

    - Measurements, Testbeds and Deployment of Wireless Systems

    Track 2: Security

    Thematic areas:

    - Security engineering. Methodologies, formalisms, modeling, tools,

    code instrumentation

    - Cryptography. Algorithms, protocols, attacks

    - Security in distributed systems.

    - Cryptographic Hardware and Embedded Systems.

    - Light-weight cryptography.

    - Information Hiding.

    - Steganography

    - Privacy and Anonymity.

    - Security assurance. Evaluation, testing, formal proofs, certification.

    - Quantum Cryptography and QKD.

    - Trusted computing. Analyses and attacks, practical applications...

    - Surveillance and monitoring. Intrusion detection, monitoring

    techniques, architectures,...

    - Infrastructure. Middleware, proxies, PKIs, AAAs, SSO, credentials...

    - Social and psychological aspects of security. User-centered security

    evaluation, perception of security and threats...

    - Security and usability.

    Application areas:

    - Service Oriented Computing. Platform security, access control,

    Security of the SOC processes (Negotiation, Orchestration),

    Identification of services...

    - Cloud computing. Platform security, data protection, software

    protection, surveillance and dynamic reaction.

    - Ubiquitous computing, pervasive computing and ambient intelligence.

    Secure system models, development support, dynamic reaction, self-

    systems

    - Embedded systems. Dynamic replaceability, system security assessment,

    secure system composition, tampering-resistance...

    - Security in system evolution. Design for secure evolution, evolution-

    oriented surveillance, security patches...

    - Critical infrastructures. Protection architectures, redundancy and

    replication, scalability issues...

    Track 3: New Technologies & services

    - New generation Internet, Post IP and IPv6

    - NGN architectures, protocols and services management and delivery

    - Web 2.0 applications and IMS (IP Multimedia Subsystems)

    - Next generation systems & Service-oriented techniques

    - IPTV and content distribution networks

    - User-centric networking and services

    - multimedia indexing and retrieval

    - Personalized access to media systems

    - Context/content-aware services

    - Smart Homes and E-Health

    - Web Commerce & Services, Data models, Web searching & querying

    - Web Mining & Web Semantics

    - Web service based Grid computing and P2P computing

    - Advanced identification techniques (Biometrics, RFID, etc.)

    - Virtualization technologies for grid and parallel computing.

    - Interactive media, voice and video, games, immersive applications

    - Network virtualization, virtual private networks (VPN), and services

    - VoIP protocols and services

    - Content-based networking: caching, distribution, load balancing,

    resiliency

    - Mobile/wireless content distribution

    * * * * *

    Submission Instructions

    Papers should be in English, strictly not exceeding 5 double-column

    pages (3,000 words), in Adobe PDF format (which is the only accepted

    format for NTMS 2012).

    To access the full list of topics, submission guidelines, as well as

    venue and travel information please visit: www.ntms-conf.org

    CALL FOR WORKSHOPS

    Workshop proposals should provide sufficient information to evaluate

    the quality and importance of the topic, the goals of the workshop, and

    the size of the interested community.

    Proposals should identify one or more chairs and several other

    individuals willing to serve on an organizing committee and assist with

    publicity and reviewing.

    Proposals should be 2-4 pages and contain at least the workshop

    description, goals, potentieal participants and list of organizers.

    IMPORTANT DATES

    ---Paper Submission Due: January 12, 2012 (Extended deadline)

    ---Paper Notification: February 22, 2012

    ---Camera Ready Due: March 07, 2012

    Demos & NTMS Innovative Projects

    ---Demo & Innovative Projects Proposal Submission: March 29, 2012

    ---Demo & Innovative Projects Proposal Notification: April 13, 2012

    General Chair

    Albert Levi, Sabanci University, Turkey

    TPC co-Chairs (Security Track)

    Antonio Mana, University of Malaga, Spain

    Marek Klonowski, TU Wroclaw, Poland

    TPC co-Chairs (Mobility/Wireless Track)

    Ozgur Gurbuz, Sabanci University, Turkey

    Mona Ghassemian, University of Greenwich, UK

    TPC co-Chairs (New Technologies Track)

    Matteo Cesana, Politecnico di Milano, Italy

    Susana Sargento, Universidade de Aveiro, Portugal

    Workshop Co-chairs

    Fatma A. Omara, Cairo University, Egypt

    Thomas Watteyne, Dust Networks, USA

    Publicity Chair

    Mohamad Badra, Dhofar University, Oman

    Nicolas Sklavos, Technological Educational Institute of Patras, Greece

    Finance Chair

    Ibrahim Hajjeh, Ineovation, France

    Local Organization Committee Chair

    Erkay Savas, Sabanci University, Turkey


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.