posted by user: tnhh || 5101 views || tracked by 9 users: [display]

Mobisec 2010 : The Second International ICST Conference on Security and Privacy in Mobile Information and Communication Systems

FacebookTwitterLinkedInGoogle


Conference Series : Security and Privacy in Mobile Information and Communication Systems
 
Link: http://mobisec.org/
 
When May 26, 2010 - May 28, 2010
Where Catania, Sicily
Submission Deadline Jan 11, 2010
Notification Due Mar 15, 2010
Final Version Due Apr 5, 2010
Categories    mobile   security   privacy
 

Call For Papers

SCOPE

MobiSec's focus is the convergence of information and communication technology in mobile scenarios. This convergence is realised in intelligent mobile devices, accompanied by the advent of converged, and next-generation, communication networks. As mobile communication and information processing becomes a commodity, economy and society require protection of this precious resource. Mobility and trust in networking go hand in hand for future generations of users, who need privacy and security at all layers of technology. MobiSec strives to bring together the leading-edge of academia and industry in mobile systems security, as well as practitioners, standards developers and policymakers.

PAPERS

Technical papers describing original, previously unpublished research, not currently under review by another conference or journal, are solicited. MobiSec solicits original, high-quality research contributions in the form of full papers. The focus is on the security of information and communication systems including mobile networks, devices and applications. Papers from other areas, e.g., formal methods, cryptography, database security, operating system security, will be considered if a clear connection to one of the topics below is demonstrated.

Topics of interest include, but are not limited to the following focus areas, as applied to mobile ICT:
Security architectures for next-generation, new-generation, and converged communication networks
Trusted mobile devices, hardware security
Network resilience
Threat analyses for mobile systems
Multi-hop authentication and trust
Non-repudiation of communication
Context-aware and data-centric security
Protection and safety of distributed mobile data
Mobile application security
Security for voice and multimedia communication Machine-to-machine communication security
Trust in autonomic and opportunistic communication
Location based applications security and privacy
Security for the networked home environment
Security and privacy for mobile communities
Mobile emergency communication, public safety
Lawful interception and mandatory data retention
Security aspects in IP-based mobility
Security of mobile agents and code
Idenity management
Embedded security

PANELS / WORKSHOPS / TUTORIALS

Proposals for panels/workshops/tutorials are solicited. Potential organisers are welcome to submit a proposal to the Workshops Chair, the Panels Chair, or one of the general chairs.

Contact
Panels Chair Dirk Kröselberg
Workshops Chair Vincent Naessens
General Chairs Andreas U. Schmidt, Giovanni Russello
Publications

Accepted papers will be published by Springer in the MobiSec Conference Proceedings, in the Lecture Notes of the Institute for ComputerSciences, Social-Informatics and Tele-communications Engineering (LNICST) series. The proceedings will be available both as paper-based copies and via Springerlink, Springer's digital library. In addition, the content of the proceedings will be reviewed by various indexing services such as the DBLP database, ZBlMath/CompuServe, MATHSCINET, EI- INSPEC, IET, RPS, Computer Science Bibliography Administrator, Elsevier Bibliographic Databases Source Management, ULRICH, CSA, ProQuest.
Special Issues

Selected high-quality papers will be invited to special issues of prestigious international journals
Paper Submission

Paper submission will be handled electronically. Authors should prepare an Adobe Acrobat PDF version of their full paper. All submitted papers will be subject to a rigorous peer- review. Papers must be formatted using Springer LNICST Authors' Kit and submitted only through the ASSYST conference management system.
For instructions see Submission Guidelines

Papers must not exceed the limit of 12 pages including text, figures and references. The font size must be at least 10 points.
Important Dates

Paper Submission Deadline: January 11, 2010

Notification of Acceptance: March 15, 2010

Camera Ready Deadline: April 5, 2010

Conference: May 26-28, 2010 Catania, Sicily

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
ICICA 2025   2025 The 14th International Conference on Information Communication and Applications (ICICA 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
MATHCS 2024   2nd International Conference on Mathematics, Computer Science & Engineering
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IJCSITY 2024   International Journal of Computational Science and Information Technology
IMCOM 2025   19th International Conference on Ubiquitous Information Management and Communication