posted by organizer: ksaleem || 4806 views || tracked by 6 users: [display]

SPNGN 2014 : Security and Privacy in Next-Generation Networks (SPNGN)

FacebookTwitterLinkedInGoogle

Link: http://www.itng.info/Security%20and%20Privacy%20in%20Next-Generation%20Networks%20(SPNGN)_11.html
 
When Apr 7, 2014 - Apr 9, 2014
Where Las Vegas, Nevada, USA
Submission Deadline Nov 15, 2013
Notification Due Dec 13, 2013
Final Version Due Jan 31, 2014
Categories    information technology   communications   computer networks   security
 

Call For Papers

Scope:

Next Generation Network (NGN) nowadays plays an important role in the sector of telecommunication and has huge importance for future research. NGN communication is making the world’s life easier by giving round the clock connectivity with high data transfer. The NGN communication includes number of promising architectures as Internet of things, Personal wireless networks: body area wireless sensor network, wireless sensor and actuator network, Wireless Mesh networks, Next generation Internet, Cloud computing, LTE advanced, Machine-to-Machine network. The NGN communication must be secure and preserve the privacy of its users and requires innovative methods to address the continuous and emerging security threats.

This track is a forum for researchers, academics, and industries to debate the different issues related to security and privacy in next-Generation Networks, discuss relevant theoretical and practical solutions, and explore areas related to the theory, applications, development, experiences, and evaluation studies.
Topics:

Topics of the track consist of all aspects related to security and privacy issues for Next generation. They include but are not limited to:

• Vulnerability assessment
• Mobile Identity management
• Authentication, security access policies
• Privacy-respecting Authentication
• Privacy issues in the Internet of Things
• Privacy issues in wireless networks
• Security Management of Machine-to-Machine network
• Forensics analysis
• Remote and wireless-based Biometrics system
• Mobile malware
• Mobile botnets
• Security and privacy issues in Smartphones
• Intrusion and fraud detection
• Socio-economic issues

Paper Submission:
Papers should be original and contain contributions of theoretical or experimental nature, or be unique experience reports. Interested authors should submit a 6-page summary of their original and unpublished work including 5 keywords in the CPS format to the track chair. Electronic submission in the PDF, PS or MS Word format is strongly encouraged. For instructions on electronic submissions, Click here.

Evaluation Process
Papers will be evaluated for originality, significance, clarity, and soundness. Per ITNG policy, except for invited papers, all papers will be reviewed by at least two independent reviewers. Accepted papers will be published in the conference proceedings with an ISBN.

Best Student Paper:
The Best Student Paper will be awarded at the conference. To be eligible, the student must be the sole author of the paper, or the first author and primary contributor. (The winner of the award will present the paper in a plenary session at the conference). A cover letter to the General Chair/Track Chair must identify the paper as a candidate for this competition at the time of submission.

Important Dates
Submission (Extended): Nov. 15, 2013
Author Notification: Dec. 13, 2013
Advance Registration: Jan. 10, 2014
Camera Ready: Jan. 31, 2014


General Co-Chairs:
Kashif Saleem, Center of Excellence in Information Assurance (CoEIA), King Saud University, KSA. email: ksaleem@ksu.edu.sa

Abdelouahid Derhab, Center of Excellence in Information Assurance (CoEIA), King Saud University, KSA. email: abderhab@ksu.edu.sa

Track Committee:
Jalal Al-Muhtadi, King Saud University, KSA
Lei Chen, Sam Houston State University, USA
Mohamed Younis, University of Maryland Baltimore County, USA
Kang G. SHIN, University of Michigan, USA
Yacine Challal, Université de Technologie de Compiègne, France
Kalman Graffi, Universität Paderborn, Germany
Anne Kayem, University of Cape Town, South Africa
Mostafa H. Dahshan, King Saud University, KSA
Yakubu Suleiman Baguda, Bytronix Technologies Kano, Nigeria
Wei Wei, Xi'an Jiaotong University, China
Amjad Gawanmeh, Khalifa University of Science, UAE

It is a fabulous opportunity to explore, share and to experience new research ideas.

Please forward this CFP to your friends, department colleagues, advanced graduate students and colleagues at local community/junior colleges.

We look forward to meet you at the conference venue in 2014!

Related Resources

Future Networks 2017   Call for Book Chapters: Enabling Technologies and Architectures for Next-Generation Networking Capabilities
ATN 2017   Acta Technica Napocensis- Electronics and Telecommunications 2/2017
TSEC-NextSecSociety 2017   Journal of Cyber Security Technology Special Issue on Secure Smart Society in Next Generation Networking Paradigm
ICCT 2017   17th IEEE International Conference on Communication Technology(ICCT 2017)-IEEE Xplore, Ei Compendex
SCN-SPMAP 2017   Security and Communication Networks Journal - SI on Security and Privacy in Mobile Applications and Platforms
ACM--ICCIP 2017   ACM--2017 the 3rd International Conference on Communication and Information Processing (ICCIP 2017)--Ei Compendex, ISI Web of Science and Scopus
SCN-CyberIoT 2017   Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal
IEEE - ICCC 2017   3rd IEEE International Conference on Computer and Communications
SPDF-Mobile 2017   Special Issue on “The Security, Privacy, and Digital Forensics of Mobile Networks and Mobile Cloud”
CPSNGN 2017   Cyber-Physical Systems for Next Generation Networks