Fwd: [TCCC-ANNOUNCE] CFP for Security Symposium at IWCMC 2014 (Deadline: Jan. 20th, 2014)
-------- Ursprüngliche Nachricht -------- Von: Cong Wang congwang@CITYU.EDU.HK Gesendet: Fri Dec 27 02:04:34 MEZ 2013 An: tccc-announce@COMSOC.ORG Betreff: [TCCC-ANNOUNCE] CFP for Security Symposium at IWCMC 2014 (Deadline: Jan. 20th, 2014)
# Call for Papers
TPS: Trust, Privacy and Security Symposium (TSP 2014)
The 10th International Wireless Communications & Mobile Computing Conference
IWCMC 2014 Website: http://iwcmc.org/2014/ SUBMNISSION LINK: https://edas.info/newPaper.php?c=15249&track=34293 Hilton Nicosia, Cyprus, August 4-8, 2014
Technically sponsored by IEEE, IEEE Cyrus Section Local sponsor: Frederick University, Cyprus
Symposium Co-Chairs: Peter Mueller, IBM Zurich Research Laboratory, Switzerland Cong Wang, City University of Hong Kong, Kowloon, Hong Kong
# Scope:
With the advancement of mobile computer applications and due to the proliferation of heterogeneous computer and communication networks, trust, privacy and security issues have become paramount. The development of a plethora of communication standards using different bands of the radio spectrum has refocused the research interest on mobile and wireless security. The importance of the addressed area recently has been dramatically highlighted by some successful attacks against mobile platforms.
The Symposium on Trust, Privacy and Security of IWCMC 2013 is soliciting original papers on research and development topics in the field of the security of wireless networks and pervasive computing. Prospective authors are cordially invited to submit original technical papers – up to 6 pages of length. Accepted papers will be published in the conference proceedings and their authors will provide an oral presentation at IWCMC 2013 in Cyprus.
Accepted papers will be published in the IEEE IWCMC 2014 proceedings and will be included in the IEEE digital library (IEEE Xplore).
Topics of interest include, but are not limited to:
- Mobile Network and Smart Phone Security - Physical Layer Security - Privacy and Security in Clouds and Contents Distribution Networks - Privacy in Location-based Services - Privacy and Anonymity in Vehicular Networks - Security in Cognitive Radio Networks and Cooperative Communication Systems - Security of Mesh Networks - Security of Mobile Multimedia and Cloud Media - Security of Wireless Sensor Networks - Security of Cyber Physical Systems - Threat and Vulnerability Analysis for Mobile Communication - Application Level Trust, Privacy and Security - Architectures related to Trust, Privacy and Security - Attacks and Counter Measures in Mobile and Wireless Networks - Computer and Network Forensics - Cross-layer Design for Robustness and Security - Cryptanalysis, Lightweight Cryptographic Algorithms and Applications - Identity Management and Key Management Systems - Information System Security - Intrusion Detection and Response in Wireless Networks
# Submission Guidelines:
Prospective authors are invited to submit original technical papers—up to 6 pages of length, using the EDAS link https://edas.info/newPaper.php?c=15249&track=34293 for possible publication in the IWCMC 2014 Conference Proceedings, which will be included in the IEEE Xplore. Selected papers will further be considered for possible publication in three special issues in the following Journals. For more information, visit: http://iwcmc.org/2014
1. Wiley Journal of Wireless Communications and Mobile Computing (WCMC) http://www3.interscience.wiley.com/journal/76507157/home
2. The International Journal of Sensor Networks (IJSNet) http://www.inderscience.com/browse/index.php?journalCODE=ijsnet
3. The International Journal of Autonomous and Adaptive Communications Systems (IJAACS): www.inderscience.com/ijaacs
Note: There will be best paper award, best Symposium award and best Workshop award.
# Important Dates:
Submission: January 20, 2014 Acceptance notification: March 15, 2014 Camera-ready paper submissions: April 15, 2014 Registration deadline for authors: April 15, 2014. ----------------------------------------------------------------------------
participants (1)
-
Lars Wolf