posted by organizer: butlerufl || 5699 views || tracked by 10 users: [display]

WiSec 2018 : ACM Conference on Security and Privacy in Wireless and Mobile Networks

FacebookTwitterLinkedInGoogle


Conference Series : Wireless Network Security
 
Link: https://wisec18.conf.kth.se/sites/index.html
 
When Jun 18, 2018 - Jun 20, 2018
Where Stockholm, Sweden
Submission Deadline Mar 1, 2018
Notification Due Apr 2, 2018
Final Version Due Apr 30, 2014
Categories    security   mobile   wireless   networks
 

Call For Papers

ACM WiSec 2018 will run from June 18 to June 20, 2018 in Stockholm, Sweden.

ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the security and privacy of mobile software platforms, usable security and privacy, biometrics, cryptography, and the increasingly diverse range of mobile or wireless applications such as Internet of Things, and Cyber-Physical Systems. The conference welcomes both theoretical as well as systems contributions.

Topics of interest include, but are not limited to:

- Security & privacy for smart devices (e.g., smartphones)
- Wireless and mobile privacy and anonymity
- Secure localization and location privacy
- Cellular network fraud and security
- Jamming attacks and defenses
- Key management (agreement or distribution) for wireless or mobile systems
- Information-theoretic security schemes for wireless systems
- Theoretical and formal approaches for wireless and mobile security
- Cryptographic primitives for wireless and mobile security
- NFC and smart payment applications
- Security and privacy for mobile sensing systems
- Wireless or mobile security for emerging applications (e.g, privacy in health, automotive, avionics, smart grid, or IoT applications)
- Physical tracking security and privacy
- Usable mobile security and privacy
- Economics of mobile security and privacy
- Bring Your Own Device (BYOD) security
- Mobile malware and platform security
- Security for cognitive radio and dynamic spectrum access systems
- Security protocols for wireless networking

The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by the ACM.

Full and short papers

Full paper submissions to ACM WiSec 2018 can be up to 10 pages in the ACM conference style excluding the bibliography and well marked appendices, and up to 12 pages in total. ACM WiSec also encourages the submission of short papers with a length of up to 6 pages, which describe mature work of a more succinct nature. All papers must be thoroughly anonymized for double-blind reviewing. Detailed submission instructions will appear on the conference website.

Opinion papers

ACM WiSec 2018 invites papers (ACM conference style, up to 3 pages excluding references) that present personal perspectives on all aspects of security and privacy in wireless and mobile networks. Opinion papers could also criticize previous research or research directions, as well as highlight possible promising research directions. The opinions expressed in these papers are expected to be anyway corroborated by theoretical foundations, experiments, or experiences. Like the regular papers, the opinion papers will be reviewed by the WiSec Technical Program Committee. The selected opinion papers will be a part of the WiSec technical program and will be published in the conference proceedings. Opinion papers should be submitted using the same submission procedure adopted for the full papers. The title of these papers must have the prefix "Opinion:".

Reproducibility label

This year is the second one in a row for a new effort to support greater reproducibility in mobile and wireless security experimental research. The goal of this process is to increase the impact of mobile and wireless research, enable dissemination of research results, sharing of code and experiments set-ups, and to enable the research community to build on prior experimental results. Towards this goal, Wisec is introducing a reproducibility label to recognize papers whose results were reproduced by an independent group of researchers. Authors of accepted papers, can participate in this voluntary process by submitting their experiments following the reproducibility evaluation instructions. Authors are encouraged to plan ahead when running their experiments to minimize the overhead of applying for this label.

Posters and Demos

WiSec also solicits submission of posters and demos.

Double submissions

It is a policy of the ACM to disallow double submissions, where the same (or substantially similar) paper is concurrently submitted to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved.

Related Resources

FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
WiSec 2025   18th ACM Conference on Security and Privacy in Wireless and Mobile Networks
IEEE ICC'25 NextG-WiSec 2025   The 11th IEEE Workshop on NextG (6G and beyond) Wireless Security in conjunction with IEEE ICC 2025
ISCSIC 2025   2025 9th International Symposium on Computer Science and Intelligent Control(ISCSIC 2025)
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
NMCO 2025   11th International Conference on Networks, Mobile Communication
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2