Sign for Notice Everyday    注册| 登陆| 友情链接| English|

Our Sponsors


    WMNS- 2010 - The Second International Workshop on Wireless & Mobile Networks Security ( WMNS-2010 )

    View: 990

    Website coneco2009.com/wmns | Want to Edit it Edit Freely

    Category WMNS- 2010

    Deadline: April 30, 2010 | Date: September 01, 2010

    Venue/Country: Melbourne, Australia

    Updated: 2010-06-04 19:32:22 (GMT+9)

    Call For Papers - CFP

    The Second International workshop on Wireless & Mobile Networks Security will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of mobile & wireless network security. The revelation of ubiquitous computing has generated a lot of interest in wireless & Mobile networks. Traditional security measures do not fit well in these areas. Since mobility and contexts are key attributes of Mobile & wireless computing applications, the security issues need to be handled in a different way than traditional computing. Original papers are invited on wireless, sensor & mobile network security issues. The aim of the workshop is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
    Topic of Interest
    Authors are solicited to contribute to the workshop by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to
    Security under resource constraints
    Performance and security tradeoffs
    Secure roaming across administrative domains
    Key management
    Cryptographic Protocols
    Authentication and access control
    Trust establishment, negotiation, and management
    Intrusion detection and tolerance
    Secure location services
    Privacy and anonymity
    Secure routing
    Secure MAC protocols
    DoS & other security threats & Countermeasures.
    Secure clock distribution.
    Prevention of traffic analysis.
    Security for embedded systems
    Securing wireless & mobile applications
    Security and Privacy features into Mobile and Wearable devices
    Sensor Networks Security
    Wireless Ad Hoc Networks Security
    Trust establishment
    Vulnerability modeling and threat analysis
    Security & privacy in RFID systems
    Paper submission
    Authors are invited to submit papers for the workshop through email (wmns09atyahoo.com or wmnsatairccse.org )by April 30, 2010. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this workshop.
    The workshop proceedings will be published by IEEE CS series along with the main conference proceedings ( NSS 2010 ). Selected papers from, after further revisions, will be published in the following international journal.
    International journal of Network Security & Its Applications (IJNSA)

    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.