exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Fifth IFIP Call For Papers

Fifth IFIP Call For Papers
Posted Dec 19, 2011
Site ntms-conf.org

The fifth IFIP International Conference on New Technologies, Mobility and Security Call For Papers has been announced. It will take place from May 7th through the 10th, 2012 in Istanbul, Turkey.

tags | paper, conference
SHA-256 | 25130021c2ea8eb8aa1842b5fe239c462321ca387e930a78502275f10082c334

Fifth IFIP Call For Papers

Change Mirror Download
              Fifth IFIP International Conference on
New Technologies, Mobility and Security
May 7 - 10, 2012, Istanbul- Turkey
http://www.ntms-conf.org

Technically Sponsored by IEEE, COMSOC and IFIP TC6

All accepted papers will be published in IEEE Xplore. The best papers
of the conference will be considered for publication in COMNET and ADHOC
NETWORKS journals.

Overview
--------
NTMS'2012 is the Fifth International Conference on New Technologies,
Mobility and Security that will be held from 7 to 10 May 2012 in
Istanbul, Turkey.

NTMS'2012 aims at fostering advances in the areas of New Technologies,
Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS,
Network Security and E-commerce, to mention a few, and provides a
dynamic forum for researchers, students and professionals to present
their state-of-the-art research and development in these interesting
areas.

The event will be combined with tutorial sessions and workshops.
Tutorials will precede the main program, aiming at the dissemination of
mature knowledge and technology advances in the field. Two or more
Workshops will immediately follow the main conference, offering the
opportunity for a more focused exchange of ideas and presentation of on-
going research relevant to following tracks (More information and the
full call-for-papers can be found on the conference web):

Track 1 : Mobility & Wireless networks
---------------------------------------
- Beyond 3G, 4G, LTE, and WiMAX Networks
- Wireless Local Area Networks
- Wireless Personal Area Networks
- Wireless Ad Hoc and Mesh Networks
- Wireless Vehicular Networks
- Cognitive Radio Networks
- Satellite Networks
- Self-organizing and Re-configurable Wireless Networks
- Energy Efficient Wireless Sensor Network Solutions
- Wireless MAC Protocols
- Scheduling Techniques for Wireless Networks
- Wireless QoS Routing Algorithms
- Radio Resource Allocation and Management
- Cross-layer Design and Optimization in Wireless Networks
- Clustering, Topology Control, Coverage and Connectivity
- Cooperation and Relaying in Wireless Networks
- Analysis, Simulation and Performance Evaluation
- Integration of Heterogeneous Mobile, Wireless and Wire-line Radio
Access Networks
- Mobility, Location Management and Handover Techniques for Wireless
Mobile Networks
- Multimedia over Wireless and Mobile Systems
- Power-aware Architectures, Algorithms and Protocols for
Wireless/Mobile Networks
- Wireless Services and Middleware Platforms
- Green Radio Communications
- Measurements, Testbeds and Deployment of Wireless Systems

Track 2: Security
-----------------

Thematic areas:
- Security engineering. Methodologies, formalisms, modeling, tools,
code instrumentation
- Cryptography. Algorithms, protocols, attacks
- Security in distributed systems.
- Cryptographic Hardware and Embedded Systems.
- Light-weight cryptography.
- Information Hiding.
- Steganography
- Privacy and Anonymity.
- Security assurance. Evaluation, testing, formal proofs, certification.
- Quantum Cryptography and QKD.
- Trusted computing. Analyses and attacks, practical applications...
- Surveillance and monitoring. Intrusion detection, monitoring
techniques, architectures,...
- Infrastructure. Middleware, proxies, PKIs, AAAs, SSO, credentials...
- Social and psychological aspects of security. User-centered security
evaluation, perception of security and threats...
- Security and usability.

Application areas:
- Service Oriented Computing. Platform security, access control,
Security of the SOC processes (Negotiation, Orchestration),
Identification of services...
- Cloud computing. Platform security, data protection, software
protection, surveillance and dynamic reaction.
- Ubiquitous computing, pervasive computing and ambient intelligence.
Secure system models, development support, dynamic reaction, self-
systems
- Embedded systems. Dynamic replaceability, system security assessment,
secure system composition, tampering-resistance...
- Security in system evolution. Design for secure evolution, evolution-
oriented surveillance, security patches...
- Critical infrastructures. Protection architectures, redundancy and
replication, scalability issues...

Track 3: New Technologies & services
------------------------------------
- New generation Internet, Post IP and IPv6
- NGN architectures, protocols and services management and delivery
- Web 2.0 applications and IMS (IP Multimedia Subsystems)
- Next generation systems & Service-oriented techniques
- IPTV and content distribution networks
- User-centric networking and services
- multimedia indexing and retrieval
- Personalized access to media systems
- Context/content-aware services
- Smart Homes and E-Health
- Web Commerce & Services, Data models, Web searching & querying
- Web Mining & Web Semantics
- Web service based Grid computing and P2P computing
- Advanced identification techniques (Biometrics, RFID, etc.)
- Virtualization technologies for grid and parallel computing.
- Interactive media, voice and video, games, immersive applications
- Network virtualization, virtual private networks (VPN), and services
- VoIP protocols and services
- Content-based networking: caching, distribution, load balancing,
resiliency
- Mobile/wireless content distribution
* * * * *
Submission Instructions
------------------------
Papers should be in English, strictly not exceeding 5 double-column
pages (3,000 words), in Adobe PDF format (which is the only accepted
format for NTMS 2012).

To access the full list of topics, submission guidelines, as well as
venue and travel information please visit: www.ntms-conf.org

CALL FOR WORKSHOPS
------------------
Workshop proposals should provide sufficient information to evaluate
the quality and importance of the topic, the goals of the workshop, and
the size of the interested community.
Proposals should identify one or more chairs and several other
individuals willing to serve on an organizing committee and assist with
publicity and reviewing.

Proposals should be 2-4 pages and contain at least the workshop
description, goals, potentieal participants and list of organizers.

IMPORTANT DATES
---------------
---Paper Submission Due: January 12, 2012 (Extended deadline)
---Paper Notification: February 22, 2012
---Camera Ready Due: March 07, 2012

Demos & NTMS Innovative Projects
---Demo & Innovative Projects Proposal Submission: March 29, 2012
---Demo & Innovative Projects Proposal Notification: April 13, 2012

General Chair
--------------
Albert Levi, Sabanci University, Turkey

TPC co-Chairs (Security Track)
--------------------------------
Antonio Mana, University of Malaga, Spain
Marek Klonowski, TU Wroclaw, Poland

TPC co-Chairs (Mobility/Wireless Track)
----------------------------------------
Ozgur Gurbuz, Sabanci University, Turkey
Mona Ghassemian, University of Greenwich, UK

TPC co-Chairs (New Technologies Track)
---------------------------------------
Matteo Cesana, Politecnico di Milano, Italy
Susana Sargento, Universidade de Aveiro, Portugal

Workshop Co-chairs
-------------------
Fatma A. Omara, Cairo University, Egypt
Thomas Watteyne, Dust Networks, USA

Publicity Chair
---------------
Mohamad Badra, Dhofar University, Oman
Nicolas Sklavos, Technological Educational Institute of Patras, Greece

Finance Chair
--------------
Ibrahim Hajjeh, Ineovation, France

Local Organization Committee Chair
----------------------------------
Erkay Savas, Sabanci University, Turkey
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    13 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    27 Files
  • 30
    Jul 30th
    49 Files
  • 31
    Jul 31st
    29 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close