[Tccc] Deadline approaching, MobiPST 2013, March 8, 2013 with ICCCN 2013

Kewei Sha kshaatokcu.edu
Thu Feb 28 16:26:27 EST 2013



 We apologize if you received multiple copies of this CFP. 

****************************************************************************
***********  


The Third International Workshop on Privacy, Security and Trust in Mobile
and Wireless Systems (MobiPST 2013)
Paper Submission Deadline: March 8, 2013
Nassau, Bahamas, July 30, 2013
Submit paper at https://edas.info/N14331

****************************************************************************
***********

Nassau, Bahamas, July 30, 2013
Mobile wireless devices have become pervasive and attracted significant
interest from academia, industry, and standardization organizations. With
the latest cloud computing technology, those mobile wireless devices will
play a more and more important role in the computing and communication. When
those devices become pervasive, security, privacy and trust become critical
components for the acceptance of applications build based on those devices.
Moreover, the several favorable characteristics of mobile and wireless
devices, including portability, mobility, and sensitivity, further impose
the challenge the security and privacy in those systems. Despite recent
advances, many research issues remain in the design of secure,
privacy-preserving, or trust architectures, protocols, algorithms, services,
and applications on mobile and wireless systems. For example, when the
mobile devices have more storage space, high bandwidth, and super sensing
capability, more sensitive information!
  will be stored in those devices. On the other hand, the operating systems
on those devices are not as powerful and reliable as those on traditional
computers. Both OS layer and higher layer protocols are expected to enhance
the security and preserve privacy of those devices. With more mobile devices
being used in social network and regular online activities, novel trust
models are essential for the new applications. New cryptography algorithms,
key distribution schemes and access control policies are also encouraged by
considering the special characteristics of mobile and wireless devices.
Other issues such as false detection, attack models, security analysis, and
anonymity techniques are required to be revisited in mobile and wireless
systems. 
This workshop aims to bring together the technologists and researchers who
share interest in the area of security, privacy and trust in mobile and
wireless systems, as well as explore new venues of collaboration. The main
purpose is to promote discussions of research and innovative implementation
activities in the design of secure, privacy-preserving, or trust
architectures, protocols, algorithms, services, and applications on mobile
and wireless systems. It also aims at increasing the synergy between
academic and industry professionals working in this area. We plan to seek
papers that address theoretical, experimental research, and work in-progress
for security, privacy and trust related issues in the context of mobile and
wireless systems that include, but are not limited to, the following

Instructions for Authors
Authors are invited to submit manuscripts reporting original unpublished
research and recent developments in the topics related to the workshop.
Submissions should include a title, abstract, keywords, author(s) and
affiliation(s) with postal and e-mail address(es) of the corresponding
author. Submitted manuscripts must be formatted in standard IEEE
camera-ready format (double-column, 10-pt font) and must be submitted via
EDAS ( http://edas.info/N14331 ) as PDF files (formatted for 8.5x11-inch
paper). The manuscripts should be no longer than 5 pages. One additional
page is permitted if the authors are willing to pay an over-length charge at
the time of publication (manuscripts should not exceed 6 pages). Submitted
papers cannot have been previously published in or be under consideration
for publication in another journal or conference. The workshop Program
Committee reserves the right to not review papers that either exceed the
length specification or have been submitted or publish!
 ed elsewhere. Submissions must include a title, abstract, keywords,
author(s) and affiliation(s) with postal and e-mail address(es). All authors
of a paper must be registered in the RIGHT order via EDAS at the SUBMISSION
TIME and cannot be changed after the submission due time at EDAS. The paper
title and author name list/order cannot be changed during the final
camera-ready submission. The final program will be generated from EDAS
automatically. A paper abstract must be registered on EDAS by the deadline.
Review and Publication of Manuscripts
Submitted papers will be reviewed by the workshop Program Committee and
judged on originality, technical correctness, relevance, and quality of
presentation and the comments will be provided to the authors. Workshop
papers will be in the same proceedings of the main conference papers. An
accepted paper must be presented at the ICCCN 2013 venue by one of the
authors registered at the full registration rate. If any accepted paper is
not registered, the paper will be removed from the workshop program and the
proceedings. Each workshop registration covers up to two workshop papers by
an author. Accepted and registered papers will be published in proceedings
that will be available through Xplore. Papers that are not presented at the
ICCCN 2013 venue by one of the registered co-authors will not appear in
Xplore.
Outstanding papers will be invited to extend to full version for a
prestigious journal (SCI(E)-indexed), Information - An International
Interdisciplinary Journal and targeting publication in early 2014. 


_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
Tccc at lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
 




More information about the Tccc mailing list