[Tccc] Call for Papers-MWNS'11-Paper submission deadline (June 30)

Yuan-Fang Chen yuanfang.chen.tina
Tue May 17 12:51:58 EDT 2011


Please accept our apologies if you received multiple copies.
---------------------------------------------------------------------------------
*Call for Papers*

The Second International Symposium on Mobile and Wireless
Network Security (MWNS-11)
http://trust.csu.edu.cn/conference/MWNS2011/

In Conjunction with
The 6th International Conference on Frontier of
Computer Science and Technology (FCST-11)
http://trust.csu.edu.cn/conference/FCST2011/

Technically Co-Sponsored by
IEEE and IEEE Computer Society
CCF Technical Committee on Pervasive Computing
CCF Technical Committee on Office Automation


Organizers:
School of Information Science and Engineering
& School of Software, Central South University, China
Venue & Dates: Changsha, China, November 16-18, 2011


Introduction

Mobile and wireless networks are regarded as the key underlying
infrastructures
for realizing the next generation networking and computing, such as cloud
computing,
ubiquitous computing, and 4G networks. Compared to wired networks, mobile
and wireless
networks are more vulnerable to different attacks such as denial of service,

man in the middle, hijacking, spoofing, etc. In addition, they have less
resources,
which is a real problem in security solution design. These unique
characteristics of
the mobile and wireless networks pose a number of challenges in terms of
security.
We need to design secure and robust solutions which are light enough to be
supported
by mobile terminals and communications. Addressing these challenging issues
can provide
better secure services and increase the overall system performance. This
symposium aims
to identify and explore different issues and challenges related to security
aspects
in mobile and wireless networks. For example, what are the benefits or
inconvenience
of mobility on security? What are the appropriate mobility models to have a
good level
of security? Are classical IDS approaches appropriate for mobile
environments? How can
we build up trusted platforms and trustworthy systems for mobile and
wireless networks?

This symposium will be held in conjunction with the 6th International
Conference on
Frontier of Computer Science and Technology (FCST 2011), an ideal vehicle
for bringing
together researchers, scientists, engineers, academics and students all
around the world
to share the latest updates on new security technologies that would shape
the next
generation of mobile and wireless systems and technology platforms.


Scope and Interests

We are interested in the following topics, but are not limited to:

(1) Trust management in mobile and wireless networks
(2) Risk management in mobile and wireless networks
(3) Privacy in mobile and wireless networks
(4) Cryptographic devices for mobile and wireless networks
(5) Key management in mobile and wireless networks
(6) Authentication in mobile and wireless networks
(7) Access control in mobile and wireless networks
(8) Anonymity in mobile and wireless networks
(9) Reliability and fault tolerance in mobile and wireless networks
(10) Secure mobile routing protocols
(11) Security under resource constraints
(12) Performance and security trade-offs in mobile and wireless networks
(13) Intrusion detection in mobile and wireless networks
(14) Secure mobile location services
(15) Denial of service in mobile and wireless networks


Submission and Publication Information

The accepted papers from this symposium will be published by IEEE Computer
Society
in FCST-11 conference/symposium proceedings (indexed by EI Compendex and
ISTP).
Papers should be written in English conforming to the IEEE conference
proceedings
format (8.5" x 11", Two-Column). Papers should be submitted through the
paper
submission system at the symposium website. Each paper is limited to 6 pages

(or 10 pages with the over length charge). Distinguished papers, after
further
revisions, will be invited for possible publication in special issues of
prestige
international journals indexed by SCI and EI (pending). Submitting a paper
to
the symposium means that, if the paper is accepted, at least one author
should
attend the symposium and present the paper. For no-show authors, their
papers
will be removed from the IEEE Computer Society digital library after the
symposium
and their affiliations will be notified.


Important Dates

(1) Paper submission due:            June 30, 2011
(2) Notification of decision:        August 30, 2011
(3) Camera-ready papers due:         September 30, 2011


Program Co-Chairs

Lei Shu, Osaka University, Japan
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Fang Qi, Central South University, China


Program Committee

TBD


Publicity Co-Chairs

Yuanfang Chen, Dalian University of Technology, China
Trung Q. Duong, Blekinge Institute of Technology, Sweden


Webmasters

Linlin Shan, Central South University, China
Xiaofei Xing, Central South University, China


Contact

Please email inquiries concerning MWNS 2011 to:
Dr. Lei Shu: lei.shu AT live DOT ie and
the symposium organizers: mwns2011 AT gmail DOT com
---------------------------------------------------------------------------------



More information about the TCCC mailing list