posted by user: GFMarias || 3024 views || tracked by 7 users: [display]

SPAWN 2009 : 2nd IEEE WoWMoM Workshop on Security, Privacy and Authentication in Wireless Networks

FacebookTwitterLinkedInGoogle

Link: http://www.ece.stevens-tech.edu/~ychen/workshop_spawn2009/spawn_home.htm
 
When Jun 15, 2009 - Jun 15, 2009
Where Kos, Greece
Submission Deadline Feb 10, 2009
Notification Due Feb 28, 2009
Final Version Due Mar 15, 2009
Categories    security   privacy   authentication   wireless
 

Call For Papers

Aims and Scope

As the number of wireless network installations is growing fast and become popular, the number of mobile users is still expanding, the mobile services and applications are becoming more and more data-driven and the horizontal roaming between cellular and wireless local networks in now feasible the associated security, privacy and trust issues are becoming more challenging.

The objectives of the SPAWN¡¯08 Workshop are to develop new security, privacy and trust concepts for wireless and mobile networks. We solicited papers that consider wireless, MANET, cellular, vehicular, ad hoc, cognitive and sensor networks. The workshop aims to attract research work that not only address the major research issues involved in achieving a high level of security and privacy for these types of networks, but also research work that envisages new applications for wireless networks and the security and privacy challenges unique to these applications.

Topics
-----------------------
Cross-layer approaches to security
Key exchange, distribution and management in ad-hoc/sensor networks
Secure group communications
Secure PHY/MAC/routing protocols
Network Coding Security
Secure cooperation in wireless networks
Jamming and counter measures
Capacity and security analysis of covert channels
Light-weight cryptography and protocols
Ad hoc network security
Cognitive radio network security
Intrusion detection, localization, and avoidance
Power-reliability-security trade-offs in wireless networks
Throughput-Security trade-offs in wireless networks
Reasoning about Security, Privacy and Trust
Measuring wireless security
Threats and vulnerabilities
Denial of service attacks
Intrusion prevention, detection and protection systems
Malware in wireless services and applications
PETs
Location privacy and secure localization
Location aware security in mobile networks
Trust and reputation management
Deploying and enforcing security policies in wireless networks
Forensic tools
Role of Incentives to support secure and privacy
Cryptographic primitives for wireless communication
Formal methods for wireless security
Case Studies


Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICSIP 2026   IEEE--2026 11th International Conference on Signal and Image Processing (ICSIP 2026)
EI/Scopus-ICDSIC 2025   2025 International Conference on Digital Society and Intelligent Computing-EI/Scopus
Ei/Scopus-ITCC 2026   2026 6th International Conference on Information Technology and Cloud Computing (ITCC 2026)
IOTSEC 2025   2nd International Conference on IoT & Information Security
IEEE WOWMOM 2026   27th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
IJMECH 2025   International Journal of Recent Advances in Mechanical Engineering
DBSec 2026   40th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
ENERGY 2025   3rd International Conference on Energy
ICISPP 2026   2026 7th International Conference on Information Security and Privacy Protection (ICISPP 2026)