posted by system || 8039 views || tracked by 20 users: [display]

WiSec 2010 : The Third ACM Conference on Wireless Network Security

FacebookTwitterLinkedInGoogle


Conference Series : Wireless Network Security
 
Link: http://www.sigsac.org/wisec/WiSec2010
 
When Mar 22, 2010 - Mar 24, 2010
Where Hoboken, NJ, USA
Submission Deadline Sep 21, 2009
Notification Due Nov 30, 2009
Final Version Due Jan 6, 2010
Categories    security   wireless
 

Call For Papers

---------------------------------------------------------------------
The Third ACM Conference on Wireless Network Security

ACM WiSec '10

March 22-24, 2010
Stevens Institute of Technology, Hoboken, NJ, USA
http://www.sigsac.org/wisec/WiSec2010
---------------------------------------------------------------------
*** CALL FOR PAPERS ***

As wireless networks become ubiquitous, their security gains in
importance. The ACM Conference on Wireless Network Security (WiSec) aims
at exploring attacks on wireless networks as well as techniques to thwart
them. The considered networks encompass cellular, metropolitan, local
area, vehicular, ad hoc, satellite, underwater, cognitive radio, and
sensor networks, as well as RFID.

ACM WiSec results from the merger of three workshops: ESAS (European
Workshop on the Security of Ad Hoc and Sensor Networks), SASN (ACM
Workshop on the Security of Ad Hoc and Sensor Networks) and WiSe (ACM
Workshop on Wireless Security).
The proceedings will be published by the ACM.

Important Dates:
Submission due: September 21, 2009
Notification of acceptance: November 30, 2009
Camera-ready version due: January 6, 2010
Conference: March 22-24, 2010

Topics of interest include, but are not limited to:

* Naming and addressing vulnerabilities
* Key management in wireless/mobile environments
* Secure neighbor discovery / Secure localization
* Secure PHY and MAC protocols
* Trust establishment
* Intrusion detection, detection of malicious behavior
* Revocation of malicious parties
* Denial of service
* User privacy, location privacy
* Anonymity, prevention of traffic analysis
* Identity theft and phishing in mobile networks
* Charging
* Cooperation and prevention of non-cooperative behavior
* Economics of wireless security
* Vulnerability and attack modeling
* Incentive-aware secure protocol design
* Jamming/Anti-jamming communication
* Cross-layer design for security
* Monitoring and surveillance
* Cryptographic primitives for wireless communication
* Formal methods for wireless security
* Mobile platform and systems (OS and application) security

General Chair:
Susanne Wetzel Stevens Institute of Technology, USA

Program Committee Co-chairs:
Cristina Nita-Rotaru Purdue University, USA
Frank Stajano University of Cambridge, UK

Publicity Chair:
Reza Curtmola New Jersey Institute of Technology, USA

Web/Publication Chair:
Jing Dong Purdue Univeristy, USA

Steering Committee:
Jean-Pierre Hubaux, EPFL, Switzerland (chair)
Claude Castelluccia, INRIA, France
Douglas Maughan, DHS/HSARPA, USA
Adrian Perrig, Carnegie Mellon University, USA
Nitin Vaidya, University of Illinois, USA
Dirk Westhoff, NEC Europe Network Lab, Germany
Levente Buttyan, BME, Hungary
Virgil Gligor, University of Maryland, USA
Peng Ning, North Carolina State University, USA
Radha Poovendran, University of Washington, USA
Cliff Wang, Army Research Office, USA

Related Resources

ACIE--EI 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICCNS--EI 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
ICTCE--EI 2025   2025 The 7th International Conference on Telecommunications and Communication Engineering (ICTCE 2025)
Ei/Scopus-CVPRAI 2025   2025 International Conference on Computer Vision, Pattern Recognition and Artificial Intelligence (CVPRAI 2025)
ASUC 2025   16th International Conference on Ad hoc, Sensor & Ubiquitous Computing
ICDMIS 2025   International Conference on Data Mining and Information Security
CIOS 2025   3rd International Conference on Cloud, IoT and Security