[Tccc] Deadline Tomorrow MobiPST 2013 with ICCCN, Final CFP

Sha, Kewei KShaatokcu.edu
Thu Mar 28 14:55:15 EDT 2013



 We apologize if you received multiple copies of this CFP. 

****************************************************************************  

The Third International Workshop on Privacy, Security and Trust in Mobile and 
Wireless Systems (MobiPST 2013) 

Paper Submission Deadline: March 29, 2013

Nassau, Bahamas, July 30, 2013 

Submit paper at https://edas.info/N14331

****************************************************************************

Nassau, Bahamas, July 30, 2013

Mobile wireless devices have become pervasive and attracted significant 
interest from academia, industry, and standardization organizations. With the 
latest cloud computing technology, those mobile wireless devices will play a 
more and more important role in the computing and communication. When those 
devices become pervasive, security, privacy and trust become critical 
components for the acceptance of applications build based on those devices.

Moreover, the several favorable characteristics of mobile and wireless devices, 
including portability, mobility, and sensitivity, further impose the challenge 
the security and privacy in those systems. Despite recent advances, many 
research issues remain in the design of secure, privacy-preserving, or trust 
architectures, protocols, algorithms, services, and applications on mobile and 
wireless systems. For example, when the mobile devices have more storage space, 
high bandwidth, and super sensing capability, more sensitive information!

  will be stored in those devices. On the other hand, the operating systems on 
those devices are not as powerful and reliable as those on traditional 
computers. Both OS layer and higher layer protocols are expected to enhance the 
security and preserve privacy of those devices. With more mobile devices being 
used in social network and regular online activities, novel trust models are 
essential for the new applications. New cryptography algorithms, key 
distribution schemes and access control policies are also encouraged by 
considering the special characteristics of mobile and wireless devices.

Other issues such as false detection, attack models, security analysis, and 
anonymity techniques are required to be revisited in mobile and wireless 
systems. 

This workshop aims to bring together the technologists and researchers who 
share interest in the area of security, privacy and trust in mobile and 
wireless systems, as well as explore new venues of collaboration. The main 
purpose is to promote discussions of research and innovative implementation 
activities in the design of secure, privacy-preserving, or trust architectures, 
protocols, algorithms, services, and applications on mobile and wireless 
systems. It also aims at increasing the synergy between academic and industry 
professionals working in this area. We plan to seek papers that address 
theoretical, experimental research, and work in-progress for security, privacy 
and trust related issues in the context of mobile and wireless systems that 
include, but are not limited to, the following

Instructions for Authors

Authors are invited to submit manuscripts reporting original unpublished 
research and recent developments in the topics related to the workshop.

Submissions should include a title, abstract, keywords, author(s) and

affiliation(s) with postal and e-mail address(es) of the corresponding author. 
Submitted manuscripts must be formatted in standard IEEE camera-ready format 
(double-column, 10-pt font) and must be submitted via EDAS ( 
http://edas.info/N14331 ) as PDF files (formatted for 8.5x11-inch paper). The 
manuscripts should be no longer than 5 pages. One additional page is permitted 
if the authors are willing to pay an over-length charge at the time of 
publication (manuscripts should not exceed 6 pages). Submitted papers cannot 
have been previously published in or be under consideration for publication in 
another journal or conference. The workshop Program Committee reserves the 
right to not review papers that either exceed the length specification or have 
been submitted or publish!

ed elsewhere. Submissions must include a title, abstract, keywords,

author(s) and affiliation(s) with postal and e-mail address(es). All authors of 
a paper must be registered in the RIGHT order via EDAS at the SUBMISSION TIME 
and cannot be changed after the submission due time at EDAS. The paper title 
and author name list/order cannot be changed during the final camera-ready 
submission. The final program will be generated from EDAS automatically. A 
paper abstract must be registered on EDAS by the deadline.

Review and Publication of Manuscripts

Submitted papers will be reviewed by the workshop Program Committee and judged 
on originality, technical correctness, relevance, and quality of presentation 
and the comments will be provided to the authors. Workshop papers will be in 
the same proceedings of the main conference papers. An accepted paper must be 
presented at the ICCCN 2013 venue by one of the authors registered at the full 
registration rate. If any accepted paper is not registered, the paper will be 
removed from the workshop program and the proceedings. Each workshop 
registration covers up to two workshop papers by an author. Accepted and 
registered papers will be published in proceedings that will be available 
through Xplore. Papers that are not presented at the ICCCN 2013 venue by one of 
the registered co-authors will not appear in Xplore.

Outstanding papers will be invited to extend to full version for a prestigious 
journal (SCI(E)-indexed), Information - An International Interdisciplinary 
Journal and targeting publication in early 2014. 



Kewei Sha | Assistant Professor of Computer Science
Oklahoma City University| Meinders School of Business 
2501 North Blackwelder | Oklahoma City, OK | 73106
P: (405) 208-6052 | F: (405) 208-5098

    

    


_______________________________________________
IEEE Communications Society Tech. Committee on Computer Communications
(TCCC) - for discussions on computer networking and communication.
Tccc at lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
 




More information about the Tccc mailing list