| |||||||||||||||
WiSec 2010 : The Third ACM Conference on Wireless Network SecurityConference Series : Wireless Network Security | |||||||||||||||
Link: http://www.sigsac.org/wisec/WiSec2010 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
---------------------------------------------------------------------
The Third ACM Conference on Wireless Network Security ACM WiSec '10 March 22-24, 2010 Stevens Institute of Technology, Hoboken, NJ, USA http://www.sigsac.org/wisec/WiSec2010 --------------------------------------------------------------------- *** CALL FOR PAPERS *** As wireless networks become ubiquitous, their security gains in importance. The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless networks as well as techniques to thwart them. The considered networks encompass cellular, metropolitan, local area, vehicular, ad hoc, satellite, underwater, cognitive radio, and sensor networks, as well as RFID. ACM WiSec results from the merger of three workshops: ESAS (European Workshop on the Security of Ad Hoc and Sensor Networks), SASN (ACM Workshop on the Security of Ad Hoc and Sensor Networks) and WiSe (ACM Workshop on Wireless Security). The proceedings will be published by the ACM. Important Dates: Submission due: September 21, 2009 Notification of acceptance: November 30, 2009 Camera-ready version due: January 6, 2010 Conference: March 22-24, 2010 Topics of interest include, but are not limited to: * Naming and addressing vulnerabilities * Key management in wireless/mobile environments * Secure neighbor discovery / Secure localization * Secure PHY and MAC protocols * Trust establishment * Intrusion detection, detection of malicious behavior * Revocation of malicious parties * Denial of service * User privacy, location privacy * Anonymity, prevention of traffic analysis * Identity theft and phishing in mobile networks * Charging * Cooperation and prevention of non-cooperative behavior * Economics of wireless security * Vulnerability and attack modeling * Incentive-aware secure protocol design * Jamming/Anti-jamming communication * Cross-layer design for security * Monitoring and surveillance * Cryptographic primitives for wireless communication * Formal methods for wireless security * Mobile platform and systems (OS and application) security General Chair: Susanne Wetzel Stevens Institute of Technology, USA Program Committee Co-chairs: Cristina Nita-Rotaru Purdue University, USA Frank Stajano University of Cambridge, UK Publicity Chair: Reza Curtmola New Jersey Institute of Technology, USA Web/Publication Chair: Jing Dong Purdue Univeristy, USA Steering Committee: Jean-Pierre Hubaux, EPFL, Switzerland (chair) Claude Castelluccia, INRIA, France Douglas Maughan, DHS/HSARPA, USA Adrian Perrig, Carnegie Mellon University, USA Nitin Vaidya, University of Illinois, USA Dirk Westhoff, NEC Europe Network Lab, Germany Levente Buttyan, BME, Hungary Virgil Gligor, University of Maryland, USA Peng Ning, North Carolina State University, USA Radha Poovendran, University of Washington, USA Cliff Wang, Army Research Office, USA |
|