posted by user: tague || 14680 views || tracked by 26 users: [display]

WiSec 2012 : The Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks

FacebookTwitterLinkedInGoogle


Conference Series : Wireless Network Security
 
Link: http://www.sigsac.org/wisec/WiSec2012
 
When Apr 16, 2012 - Apr 18, 2012
Where Tucson, Arizona, USA
Submission Deadline Dec 2, 2011
Notification Due Feb 1, 2012
Final Version Due Feb 22, 2012
Categories    wireless security   network security   mobile security and privacy   security and privacy
 

Call For Papers

---------------------------------------------------------------------
The Fifth ACM Conference on Security and Privacy in
Wireless and Mobile Networks

ACM WiSec '12

April 16-18, 2012
Tucson, Arizona, USA
http://www.sigsac.org/wisec/WiSec2012
---------------------------------------------------------------------
*** CALL FOR PAPERS ***


As wireless and mobile networking becomes ubiquitous, security and privacy
become increasingly critical. The focus of the ACM Conference on Security and
Privacy in Wireless and Mobile Networks (ACM WiSec) is on exploring
vulnerabilities, threats, and attacks in wireless communications and the
techniques needed to address them. Settings of interest include cellular,
metropolitan, mesh, local-area, personal-area, home, vehicular, sensor,
ad hoc, satellite, cognitive radio, RFID, and underwater networks as well
as systems using non-RF wireless communication.

The conference is soliciting contributions to topics including
but not limited to:

* Key management in wireless/mobile environments
* Secure services (neighbor discovery, localization, etc.)
* Secure PHY and MAC protocols
* Trust establishment
* Intrusion, attack, and malicious behavior detection
* Denial of service
* User and location privacy
* Anonymity, unobservability, prevention of traffic analysis
* Identity theft and phishing in mobile networks
* Charging & secure payment
* Cooperation and mitigating non-cooperative behavior
* Economics of wireless security
* Vulnerability and attack modeling
* Incentive-aware secure protocol design
* Jamming/Anti-jamming communication
* Cross-layer design for security
* Monitoring and surveillance
* Cryptographic primitives for wireless communication
* Theoretical foundations and formal methods for wireless security and privacy
* Security and privacy of mobile OS and mobile applications
* Secure delay- and disruption-tolerant networking
* Secure non-RF wireless communication (e.g., ultrasound, vision, laser)
* Security/privacy in wireless smart grid and smart metering applications
* Security/privacy in wireless network coding
* Security/privacy in wireless/ephemeral social networking
* Security/privacy in mobile/wireless cloud services

The proceedings of ACM WiSec are published by the ACM.

Submissions to WiSec 2012 can be up to 12 pages in the ACM conference style
and must be thoroughly anonymized for double-blind reviewing. Detailed submission
instructions will appear on the conference website
(http://www.sigsac.org/wisec/WiSec2012/).

IMPORTANT NOTE: It is a policy of the ACM
(http://www.acm.org/pubs/rights.html) to disallow double submissions,
where the same (or substantially similar) paper is concurrently submitted to
multiple conferences/journals. Any double submissions detected will be
immediately rejected from all conferences/journals involved.

Important Dates
* Paper submission: December 2, 2011
* Notification of acceptance: February 1, 2012
* Camera-ready version: February 22, 2012
* Conference: April 16-18, 2012

Organizers
- General Chairs:
Marwan Krunz (University of Arizona, USA)
Loukas Lazos (University of Arizona, USA)

- Program Co-chairs:
Roberto Di Pietro (Roma Tre University of Rome, Italy)
Wade Trappe (Rutgers University, USA)

- Publicity Chair:
Patrick Tague (Carnegie Mellon University, USA)

- Poster/Demo Chair:
Cristina Nita-Rotaru (Purdue University, USA)

- Steering Committee
Gene Tsudik (University of California, Irvine, USA) (chair)
Jean-Pierre Hubaux (EPFL, Switzerland)
Claude Castelluccia (INRIA, France)
Douglas Maughan (DHS/HSARPA, USA)
Adrian Perrig (Carnegie Mellon University, USA)
Nitin Vaidya (University of Illinois, USA)
Dirk Westhoff (NEC Europe Network Lab, Germany)
Levente Buttyan (BME, Hungary)
Virgil Gligor (Carnegie Mellon University, USA)
Peng Ning (North Carolina State University, USA)
Radha Poovendran (University of Washington, USA)
Cliff Wang (Army Research Office, USA)

Related Resources

FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
AIMLA 2025   5th International Conference on AI, Machine Learning and Applications
WiSec 2025   18th ACM Conference on Security and Privacy in Wireless and Mobile Networks
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
Springer CCCN 2025   Springer--2025 The 3rd International Conference on Cloud Computing and Computer Network (CCCN 2025)
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex