[prev in list] [next in list] [prev in thread] [next in thread] 

List:       tccc
Subject:    [Tccc] CFP: International Workshop on Security and Privacy for Mobile and Wireless
From:       "Kami Makki" <kmakki () eng ! utoledo ! edu>
Date:       2005-10-19 22:26:56
Message-ID: 04e401c5d4fc$36e372d0$a411b783 () EECSNI2023SM
[Download RAW message or body]

CALL FOR PAPERS
(paper submission deadline: November 11, 2005)
http://www.lasr.cs.ucla.edu/wspwn06

International Workshop on Research Challenges in
Security and Privacy for Mobile and Wireless Networks (WSPWN06)
In conjunction with the Applied Electromagnetic Computational Society Meeting

March 15-16, 2006
Hyatt Regency Hotel, Miami, Florida

Our computing world becomes increasingly wireless and mobile, while simultaneously we \
face greater threats to our security and privacy.  In addition to inheriting most of \
the security and privacy problems of the standard networked environment, the special \
characteristics of the mobile and wireless environments introduce new challenges that \
have only begun to be studied.  It is vital that researchers and developers \
investigate and address these new challenges before they have a chance to cripple the \
promise of the mobile wireless future. To that end, the International Workshop on \
Research Challenges in Mobile and Wireless Security and Privacy will bring together \
leading researchers and developers in the security and privacy fields to study the \
special problems and challenges of the mobile and wireless environments. The goal of \
the workshop is to foster communication not only between the different security and \
privacy communities, but also between those communities and the distributed systems \
and information systems communities. Such collaboration is vital to achieve a high \
degree of security and privacy, without which the use and safety of mobile and \
wireless computing will be limited.

Scope:
----------
The objective of the workshop is to define and establish a common infrastructure of \
the discipline and to develop a consensus-based document that will provide a \
foundation for implementation, standardization, and further research. The workshop \
will identify and define fundamental concepts and techniques, resolve conflicts \
between certain approaches in the area and provide a common ground for advanced \
research and development in security and privacy, concentrating on the special \
challenges of the mobile and wireless environments. The topics that will be addressed \
include, but are not limited to, the following, all as they pertain to the mobile and \
wireless environment:

* Security issues in wireless LANs
* Security issues in wireless Internet 
* Special security issues for mobile devices
* Location privacy
* Security issues in ubiquitous and pervasive computing
* Security in wireless ad hoc networks
* Mobile IP security
* Wireless communication security
* Trust and privacy issues in mobile environments
* New vulnerabilities in wireless and mobile environments
* New threats to privacy in wireless and mobile environments
* Cryptology in mobile and wireless applications
* Denial of service attacks in mobile and wireless environments
* Intrusion detection systems for mobile and wireless environments
* Security issues in Web services for mobile and wireless environments
* Security issues in electronic mail in mobile and wireless environments
* Firewalls and VPNs for mobile and wireless environments
* Privacy leakage in mobile and wireless environments
* Authentication and authorization protocols for mobile and wireless environments
* Privacy-enhancing technologies for mobile and wireless environments
* Privacy and policy issues in mobile and wireless environments
* Access control in mobile and wireless environments
* Electronic commerce security for mobile and wireless environments


Workshop Format:
-------------------
The workshop format will encourage productive interaction among participants. It will \
consist of the presentation of position papers and invited papers on new developments \
and current trends, with ample time allocated for group discussions. This format \
should provide a forum for collaborations to develop among members of the different \
research and development communities. Attendance will be limited and attendants will \
be asked to contribute to a consensus-based paper on security and privacy to be \
published after the workshop.


Submission:
------------
Authors are invited to submit position papers discussing issues in the mobile and \
wireless networks security and privacy that must be addressed to achieve consensus. \
Position papers that challenge existing ideas in mobile and wireless networks \
security and privacy with new research, technologies and visionary applications are \
also encouraged. Position papers should be between 10 and 25 pages in length, and \
should include the title, author(s), authors' affiliation and an abstract. Submitters \
should also indicate their willingness to contribute to the final report. Electronic \
submission is strongly encouraged. If electronic submission is not possible, five (5) \
hard copies of the paper should be sent. Contact information for both forms of \
submission is provided below. The accepted papers will be distributed to the \
participants prior to the workshop and will also appear in print together with the \
consensus paper after the workshop.

Important Dates:
-----------------
Paper submission deadline: November 11, 2005
Notification of acceptance: December 16, 2005
Camera ready due: February 10, 2006
Workshop: March 15, 2006

Workshop Organizer
---------------
Kia Makki, Florida International University

General Co-Chairs:
---------------
Kia  Makki, Florida International University
Niki Pissinou, Florida International University

Technical Program Co-Chairs:
---------------
Peter Reiher, UCLA
Kami (Sam) Makki, University of Toledo

Program Committee:
---------------
Ehab Al-Shaer, DePaul University   
John Baras, University of Maryland   
Bharat Bhargarva, Purdue University   
Mike Burmeister, Florida State University   
Senad Busovaca, California State University, Sacramento   
Roy Campbell, University of Illinois, Urbana Champaign   
Christos Douligeris, University of Piraeus, Greece   
Virgil Gligor, University of Maryland   
Parviz Kermani, IBM Watson   
Jiejun Kong, UCLA   
Birgitta Koenig-Ries, Karlsruhe University   
Wenke Lee, Georgia Tech   
Xuan Liu, IBM Watson   
Jelena Mirkovic, University of Delaware   
Wuxu Peng, Texas State University   
Adrian Perrig, Carnegie Mellon University   
Frank Seliger, IBM Pervasive Computing, Germany   
Mani Srivastava, UCLA   
Weili Wu, University of Texas at Dallas   
Yelena Yesha, University of Maryland, Baltimore County   
Yongguang Zhang, HRL Labs  

Contact Information:
---------------------
Peter Reiher
3564 Boelter Hall
UCLA
405 Hilgard Ave.
Los Angeles, CA 90095
(310) 825-8332
reiher@cs.ucla.edu
----------------------------------------


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic