The 10th International Wireless Communications & Mobile Computing Conference (IWCMC 2014)
发布时间: 2014-01-22   浏览次数: 324

CFP for Security Symposium Due Date: Feb, 3.

Call for Papers

TPS: Trust, Privacy and Security Symposium (TPS 2014)

  The 10th International Wireless Communications & 
             
               ***************************
               Due Date: February, 3. 2014
               ***************************

IWCMC 2014 Website: http://iwcmc.org/2014/
SUBMNISSION LINK: https://edas.info/newPaper.php?c=15249&track=34293  
Hilton Nicosia, Cyprus, August 4-8, 2014

Technically sponsored by IEEE, IEEE Cyrus Section
Local sponsor: Frederick University, Cyprus

Symposium Co-Chairs:
Peter Mueller, IBM Zurich Research Laboratory, Switzerland
Cong Wang, City University of Hong Kong, Kowloon, Hong Kong

Scope:
With the advancement of mobile computer applications and due to the
proliferation of heterogeneous computer and communication networks,
trust, privacy and security issues have become paramount. The
development of a plethora of communication standards using different
bands of the radio spectrum has refocused the research interest on
mobile and wireless security. The importance of the addressed area
recently has been dramatically highlighted by some successful attacks
against mobile platforms.

The Symposium on Trust, Privacy and Security of IWCMC 2013 is
soliciting original papers on research and development topics in the
field of the security of wireless networks and pervasive computing.
Prospective authors are cordially invited to submit original technical
papers up to 6 pages of length. Accepted papers will be published in
the conference proceedings and their authors will provide an oral
presentation at IWCMC 2013 in Cyprus.

Accepted papers will be published in the IEEE IWCMC 2014 proceedings
and will be included in the IEEE digital library (IEEE Xplore).
Topics of interest include, but are not limited to:

- Mobile Network and Smart Phone Security
- Physical Layer Security
- Privacy and Security in Clouds and Contents Distribution Networks
- Privacy in Location-based Services
- Privacy and Anonymity in Vehicular Networks
- Security in  Cognitive Radio Networks and Cooperative Communication
  Systems
- Security of Mesh Networks
- Security of Mobile Multimedia and Cloud Media
- Security of Wireless Sensor Networks
- Security of Cyber Physical Systems
- Threat and Vulnerability Analysis for Mobile Communication
- Application Level Trust, Privacy and Security
- Architectures related to Trust, Privacy and Security
- Attacks and Counter Measures in Mobile and Wireless Networks
- Computer and Network Forensics
- Cross-layer Design for Robustness and Security
- Cryptanalysis, Lightweight Cryptographic Algorithms and Applications
- Identity Management and Key Management Systems
- Information System Security
- Intrusion Detection and Response in Wireless Networks

Submission Guidelines:
Prospective authors are invited to submit original technical papers up
to 6 pages of length, using the EDAS link
https://edas.info/newPaper.php?c=15249&track=34293
for possible publication in the IWCMC 2014 Conference Proceedings,
which will be included in the IEEE Xplore. Selected papers will further
be considered for possible publication in three special issues in the
following Journals. For more information, visit:
http://iwcmc.org/2014

Note: There will be best paper award, best Symposium award and best Workshop award.

Important Dates:
Submission:                                 February 3, 2014
Acceptance notification:                 March 15, 2014
Camera-ready paper submissions:         April 15, 2014
Registration deadline for authors:         April 15, 2014