-------- Original-Nachricht -------- Betreff: CfP: Wireless and Sensor Network Security (IEEE WSNS 2010) Datum: Tue, 22 Jun 2010 08:12:35 +0200 Von: Falko Dressler dressler@INFORMATIK.UNI-ERLANGEN.DE Antwort an: Mailing List der GI FG 3.3.1 "Kommunikation und Verteilte Systeme" KUVS-L@LISTSERV.UNI-HEIDELBERG.DE An: KUVS-L@LISTSERV.UNI-HEIDELBERG.DE
Liebe Kollegen,
vielleicht ist dieser Call fuer Sie von Interesse:
********************************************************************************
CALL FOR PAPERS
The Sixth IEEE International Workshop on Wireless and Sensor Networks Security (WSNS'10) November 8th, 2010
www.cs.wcupa.edu/~zjiang/wsns10.htm
held in conjunction with The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems November 8 - October 12, 2010 San Francisco, CA, USA
--------------------------------------------------------------------------------
Theme and scope:
Wireless networks have experienced an explosive growth during the past few years. Nowadays, there is a large variety of networks spanning from the well-known cellular networks to non-infrastructure wireless networks such as mobile ad hoc networks and sensor networks. The security issue is a central concern for achieving secured communication in these networks. This one day workshop aims to bring together researchers and practitioners from wireless and sensor networking, security, privacy, cryptography, and distributed computing communities, with the goals of promoting discussions and collaborations. We are interested in novel research on all aspects of security and privacy in wireless and sensor networks and their cost-effective solutions.
--------------------------------------------------------------------------------
Topics of interest:
We are seeking papers that describe original and unpublished contributions addressing various aspects of secured wireless/sensor networks. Topics of interest include, but are not limited to:
· Attacks and Countermeasures · Authentication and Access Control · Computer-Aided Tool for Security · Cross-layer Design for Security · Cryptographic Protocol · Denial of Service (DoS) · Key Management · Information Hiding · Intrusion Detection and Response · Malicious Behavior Detection and Analysis · Privacy and Anonymity · Secure Localization and Synchronization · Security and Performance tradeoff · Security Policy and Enforcement Issues · Security Protocols Analysis, Design, and Proof · Secure Routing/MAC · Surveillance and Monitoring · Trust Establishment and Management
--------------------------------------------------------------------------------
Paper Submission:
Submit a full paper of about 6 pages (IEEE two column, single-spaced format), including figures and references, using 10 font size, and number each page. Each submitted paper will be peer reviewed and the comments will be provided to the authors. Accepted papers will be published in the conference proceedings of the MASS'09.
Use the Author Guidelines available at conference website (https://mass2010.soe.ucsc.edu/node/7). Prepare your papers in PDF file only (Adobe format), paper title, names, affiliations, postal address, and e-mail address of the authors, about 100-150 word abstract, and at most five keywords.
Submit your paper to EDAS (http://www.edas.info/newPaper.php?c=9059). Submission of a paper should be regarded as an undertaking that, should the paper be accepted, at least one of the authors will attend the workshop to present the work. A full conference registration is needed and will include the ability to attend any workshop and regular conference session.
--------------------------------------------------------------------------------
Important Dates:
Manuscript Submission (Extended): 7/16/2010 Acceptance Notification: 8/13/2010 Final Manuscript Due: 9/3/2010
--------------------------------------------------------------------------------
Workshop Co-chairs
Dr. Falko Dressler University of Erlangen, Germany dressler@informatik.uni-erlangen.de
Dr. Zhen Jiang West Chester University, USA zjiang@wcupa.edu
Dr. Wensheng Zhang Iowa State University, USA wzhang@cs.iastate.edu
--------------------------------------------------------------------------------
Steering Committee member
Dr. Dharma Agrawal University of Cincinnati, USA
Dr. Sajal Das University of Texas at Arlington, USA
Dr. Yong Guan Iowa State University, USA
Dr. Thomas La-Porta Pennsylvania State University, USA
Dr. Jie Wu Florida Atlantic University, USA
--------------------------------------------------------------------------------
Program Committee
L. Bao, University of California at Irvine L. Burgazzi, ENEA, Italy L. Buttyan, Budapest University of Technology and Economics, Hungary S. Chen, Florida International University X. Chen, Texas State University Y. Chen, State University of New York at Binghamton Y. Chen, Stevens Institute of Technology H. Choi, Sprint Advanced Technology Labs D. Christin, Technische Universitat Darmstadt, Germany D. Eckhoff, University of Erlangen, Germany E. Fernandez, Florida Atlantic University Q. Gu, Texas State University F. Kargl, University of Twente, Netherlands F. Li, IUPUI W. Li, Nanjing University, China S. Lim, Texas Tech University X. Lin, University of Ontario Institute of Technology, Canada C. Liu, Sun Yat-sen University, China D. Liu, University of Texas at Arlington J. Lopez-Munoz, University of Malaga, Spain W. Lou, Hong Kong Polytechnic University, Hong Kong, China M. Lu, Central South University, China N. Stakhanova, University of new Brunswick, Canada Y. Stamatiou, Computer Technology Institute, Greece B. Tong, Microsoft X. Wang, Google Y. Xia, University of Florida S. Yang, Purdue University Calumet