exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

MobiPST 2011 Call For Papers

MobiPST 2011 Call For Papers
Posted Mar 21, 2011
Site ocu-stars.okcu.edu

Call For Papers for MobiPST 2011 - The First International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2011) will be held in conjunction with the 20th International Conference on Computer Communications and Networks (ICCCN 2011), in Maui, Hawaii, USA. All papers presented in MobiPST 2011 will be published in the workshop proceedings.

tags | paper, conference
SHA-256 | ce0868ee6c6cc6ab14250d5ab7660132f5c0f37dfd0a2a4ca779a2e8b7f40feb

MobiPST 2011 Call For Papers

Change Mirror Download
The First International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2011) in conjunction with ICCCN 2011.

http://ocu-stars.okcu.edu/ksha/mobipst2011.html

Maui, Hawaii, July 31 or August 4 (TBD), 2011

The First International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2011) will be held in conjunction with the 20th International Conference on Computer Communications and Networks (ICCCN 2011), in Maui, Hawaii, USA. All papers presented in MobiPST 2011 will be published in the workshop proceedings.

Outstanding papers will be invited to extend to full version for a prestigious journal (SCI(E)-indexed).

Recently, mobile wireless devices, such as wireless sensors, smart tags, smart pads, tablets, PDAs and smart phones, have become pervasive and attracted significant interest from academia, industry, and standard organizations. With the latest cloud computing technology, those mobile wireless devices will play a more and more important role in computing and communication. When those devices become pervasive, security, privacy and trust become critical components for the acceptance of applications build based on those devices. Moreover, several favorable characteristics of mobile and wireless devices, including portability, mobility, and sensitivity, further impose the challenge of security and privacy in those systems. Despite recent advances, many research issues still remain in the design of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. For example, when mobile devices have more storage s
pace, high bandwidth, and super sensing capability, more sensitive information will be stored in those devices. On the other hand, operating systems running on those devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of those devices. With more mobile devices being used in social networks and traditional web-based systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged by considering the special characteristics of mobile and wireless devices. Other issues such as malware, cyber threat, intrusion detection, attack modeling, security analysis, identity management and anonymity techniques also need to be revisited in mobile and wireless systems.

This workshop aims to bring together the technologists and researchers who share interest in the area of security, privacy and trust in mobile and wireless systems, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the models and designs of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications, as well as analysis on cyber threat in mobile and wireless systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical, experimental research, and work in-progress for security, privacy and trust related issues in the context of mobile and wireless systems that include, but are not limited to, the following

Wireless Local Area Networks
Wireless Sensor Networks
Wireless Mesh Networks
Wireless Ad-hoc Networks
Vehicular Networks
Body-area Networks
Cellular Networks
Home Networks
Social Networks
Smart Grid
RFID-based Systems
Mobile Cloud
Cyber-Physical Systems
Internet of Things
Location-based Service Systems

Authors are invited to submit manuscripts reporting original unpublished research and recent developments in the topics related to the workshop. Submissions should include an abstract, the e-mail address of the corresponding author. The length of the papers should be limited to 6 pages in standard IEEE camera-ready format (double-column, 10-pt font). Submission via EDAS at http://edas.info//N10077. Submission of a paper should be regarded as an undertaking that, should the paper be accepted, at least one of the authors will register and attend the workshop to present the work.

All papers will be peer reviewed and the comments will be provided to the authors. All accepted papers will be published in workshop proceedings.
Outstanding papers will be invited to extend to full version for a prestigious journal (SCI(E)-indexed), which is targeting publication in early 2012.


Important Dates
-------------------------------------------------------------------------------
March 25, 2011
Paper submission due

April 25, 2011
Acceptance Notification

May 13, 2011
Camera ready versions due


Organization
-------------------------------------------------------------------------------
Workshop Co-Chairs

Kewei Sha
Oklahoma City University, USA

Zhengping Wu
University of Bridgeport, USA

Technical Program Committee

Liviu Iftode , Rutgers University, USA

James Joshi , University of Pittsburgh, USA

Johnson Thomas , Oklahoma State University, USA

Keke Chen, Wright State University, USA

Alfred Weaver, University of Virginia, USA

Danfeng (Daphne) Yao, Virginia Tech, USA

Sheikh Iqbal Ahamed, Marquette University, USA

Huiqun Yu, East China University of Science and Technology, China

William Claycomb, Sandia National Laboratories, USA

Dongwan Shin, New Mexico Tech, USA

Robert Greve, Oklahoma City University, USA

Jaehong Park, University of Texas at San Antonio, USA

Sherali Zeadally, University of the District of Columbia, USA

Julia Deng, Intelligent Automation Inc., USA

Safwan Al-Omari, Jordan University of Science and Technology, Jordan

Songqing Chen, George Mason University, USA

Gail-Joon Ahn, Arizona State University, USA

Zhiwei Wang, Nanjing University of Posts and Telecommunications, China

Loren Schwieber, Wayne State University, USA

Yafei Yang, Qualcomm Inc., USA

Rajiv Bagai, Wichita State University, USA

Junzhao Du, Xidian University, China

Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close