posted by organizer: ksaleem || 15862 views || tracked by 26 users: [display]

SPNGN 2015 : The 6th Symposium on Security and Privacy in Next-Generation Networks

FacebookTwitterLinkedInGoogle

Link: http://fac.ksu.edu.sa/sites/default/files/pdf_webpage_for_spngn2015.pdf
 
When Apr 13, 2015 - Apr 15, 2015
Where Las Vegas, Nevada, USA
Submission Deadline Oct 17, 2014
Notification Due Dec 19, 2014
Final Version Due Feb 13, 2015
Categories    information technology   communications   computer networks   security
 

Call For Papers

Scope
Next Generation Network (NGN) nowadays plays an important role in the sector of telecommunication and has huge importance for future research. NGN communication is making the world’s life easier by giving round the clock connectivity with high data transfer. The NGN communication includes number of promising architectures as Internet of things, Personal wireless networks: body area wireless sensor network, wireless sensor and actuator network, Wireless Mesh networks, Next generation Internet, Cloud computing, LTE advanced, Machine-to-Machine network. The NGN communication must be secure and preserve the privacy of its users and requires innovative methods to address the continuous and emerging security threats.
This track is a forum for researchers, academics, and industries to debate the different issues related to security and privacy in next-Generation Networks, discuss relevant theoretical and practical solutions, and explore areas related to the theory, applications, development, experiences, and evaluation studies.

Topics
Topics of the track consist of all aspects related to security and privacy issues for Next generation. They include but are not limited to:
• Vulnerability assessment
• Mobile Identity management
• Authentication, security access policies
• Privacy-respecting Authentication
• Privacy issues in the Internet of Things
• Privacy issues in wireless networks
• Security Management of Machine-to-Machine network
• Forensics analysis
• Remote and wireless-based Biometrics system
• Mobile malware
• Mobile botnets
• Security and privacy issues in Smartphones
• Intrusion and fraud detection
• Socio-economic issues

Paper Submission
Papers should be original and contain contributions of theoretical or experimental nature, or be unique experience reports. Interested authors should submit a 6-page summary of their original and unpublished work including 5 keywords. Electronic submission in the PDF, PS or MS Word format is strongly encouraged. For instructions on electronic submissions, Click here.

Evaluation Process
Papers will be evaluated for originality, significance, clarity, and soundness. Per ITNG policy, except for invited papers, all papers will be reviewed by at least two independent reviewers. Accepted papers will be published in the conference proceedings with an ISBN.

Best Student Paper
The Best Student Paper will be awarded at the conference. To be eligible, the student must be the sole author of the paper, or the first author and primary contributor. (The winner of the award will present the paper in a plenary session at the conference). A cover letter to the General Chair/Track Chair must identify the paper as a candidate for this competition at the time of submission.

Social Activities
Preconference Reception (Track Chairs to meet authors), Evening, April 12, 2015
Conference Dinner Reception, Evening, April 14, 2015

Consideration for Journals
Best presented Papers after further revision will be considered for possible publication in special issues of SCI Indexed Journals.

Important Dates
Paper Submission: December 1st, 2014
Acceptance Notification: December 19th, 2014
Advance Registration: January 9th, 2015
Camera Ready Submission: February 13th, 2015

General Co-Chairs
Kashif Saleem
Center of Excellence in Information Assurance (CoEIA), King Saud University, KSA
ksaleem@ksu.edu.sa

Abdelouahid Derhab
Center of Excellence in Information Assurance (CoEIA), King Saud University, KSA
abderhab@ksu.edu.sa


Technical Program Committee
Abdulrahman Mirza, King Saud University, KSA
Adnan Al-Anbuky, Auckland University of Technology, Auckland, New Zealand
Al-Sakib Khan Pathan, Department of Computer Science, IIUM, Malaysia
Amjad Gawanmeh, Khalifa University, UAE
Asad Raza, Majan College , Oman
Basit Shahzad, King Saud University, KSA
Christoph Thuemmler, Edinburgh Napier University, UK
Haider Abbas, NUST, Pakistan
Jalal Al-Muhtadi, King Saud University, KSA
Joel Rodrigues, Instituto de Telecomunicações, University of Beira Interior, Portugal
Kang G. SHIN, University of Michigan, USA
Kalman Graffi, Universität Paderborn, Germany
Lei Chen, Sam Houston State University, USA
Mehmet Orgun, Macquarie University, Australia
Mohamed Younis, University of Maryland, USA
Muhammad Imran, King Saud University, KSA
Mohd Adib Sarijari, University Technology Malaysia, Johor, Malaysia
Mohamed H. Eldefrawy, King Saud University, KSA
Mostafa H. Dahshan, King Saud University, KSA
Mubashir Rehmani, COMSATS Institute of Information Technology , Pakistan
Noman Haider, Universiti Teknologi PETRONAS, Malaysia
Sana Ullah, CISTER Research Center, Polytechnic Institute of Porto (IPP), Portugal
Yacine Challal, Université de Technologie de Compiègne, France
Yakubu Suleiman Baguda, Bytronix Technologies Kano, Nigeria
Yasir Mehmood, Communication Networks, University of Bremen, Germany

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
FL-AsiaCCS 2025   International Workshop on Secure and Efficient Federated Learning In Conjunction with ACM AsiaCCS 2025
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain