posted by system || 1621 views || tracked by 4 users: [display]

NTMS 2014 : Sixth IFIP International Conference on New Technologies, Mobility and Security


Conference Series : New Technologies, Mobility and Security
When Mar 30, 2014 - Apr 2, 2014
Where Dubai, UAE
Submission Deadline Nov 30, 2013
Categories    databases

Call For Papers

Sixth IFIP International Conference on
New Technologies, Mobility and Security
March 30 - April 2nd, 2014, Dubai - UAE

Technically Sponsored by IEEE, COMSOC and IFIP TC6
---) Final Extended Paper Submission Date: November 30th, 2013 (---

Accepted and presented papers will be published in the conference proceedings and
submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.
The best papers of the conference will be considered for publication in COMNET and

NTMS'2014 is the Sixth IFIP International Conference on New
Technologies, Mobility and Security that will be held from March 30th to
April 2nd in Dubai, UAE.

NTMS'2014 aims at fostering advances in the areas of New Technologies,
Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS,
Network Security and E-commerce, to mention a few, and provides a
dynamic forum for researchers, students and professionals to present
their state-of-the-art research and development in these interesting

The event will be combined with tutorial sessions and workshops.
Tutorials will precede the main program, aiming at the dissemination of
mature knowledge and technology advances in the field. Two or more
Workshops will immediately follow the main conference, offering the
opportunity for a more focused exchange of ideas and presentation of on-
going research relevant to following tracks (More information and the
full call-for-papers can be found on the conference web):

Track 1 : Mobility & Wireless networks
- Beyond 3G, 4G, LTE, and WiMAX Networks
- Wireless Local Area Networks
- Wireless Personal Area Networks
- Wireless Ad Hoc and Mesh Networks
- Wireless Vehicular Networks
- Cognitive Radio Networks
- Satellite Networks
- Self-organizing and Re-configurable Wireless Networks
- Energy Efficient Wireless Sensor Network Solutions
- Wireless MAC Protocols
- Scheduling Techniques for Wireless Networks
- Wireless QoS Routing Algorithms
- Radio Resource Allocation and Management
- Cross-layer Design and Optimization in Wireless Networks
- Clustering, Topology Control, Coverage and Connectivity
- Cooperation and Relaying in Wireless Networks
- Analysis, Simulation and Performance Evaluation
- Integration of Heterogeneous Mobile, Wireless and Wire-line Radio
Access Networks
- Mobility, Location Management and Handover Techniques for Wireless
Mobile Networks
- Multimedia over Wireless and Mobile Systems
- Power-aware Architectures, Algorithms and Protocols for
Wireless/Mobile Networks
- Wireless Services and Middleware Platforms
- Green Radio Communications
- Measurements, Testbeds and Deployment of Wireless Systems

Track 2: Security

Thematic areas:
- Security engineering. Methodologies, formalisms, modeling, tools,
code instrumentation
- Cryptography. Algorithms, protocols, attacks
- Security in distributed systems.
- Cryptographic Hardware and Embedded Systems.
- Light-weight cryptography.
- Information Hiding.
- Steganography
- Privacy and Anonymity.
- Security assurance. Evaluation, testing, formal proofs, certification.
- Quantum Cryptography and QKD.
- Trusted computing. Analyses and attacks, practical applications...
- Surveillance and monitoring. Intrusion detection, monitoring
techniques, architectures,...
- Infrastructure. Middleware, proxies, PKIs, AAAs, SSO, credentials...
- Social and psychological aspects of security. User-centered security
evaluation, perception of security and threats...
- Security and usability.

Application areas:
- Service Oriented Computing. Platform security, access control,
Security of the SOC processes (Negotiation, Orchestration),
Identification of services...
- Cloud computing. Platform security, data protection, software
protection, surveillance and dynamic reaction.
- Ubiquitous computing, pervasive computing and ambient intelligence.
Secure system models, development support, dynamic reaction, self-*
- Embedded systems. Dynamic replaceability, system security assessment,
secure system composition, tampering-resistance...
- Security in system evolution. Design for secure evolution, evolution-
oriented surveillance, security patches...
- Critical infrastructures. Protection architectures, redundancy and
replication, scalability issues...

Track 3: New Technologies & services
- New generation Internet, Post IP and IPv6
- NGN architectures, protocols and services management and delivery
- Web 2.0 applications and IMS (IP Multimedia Subsystems)
- Next generation systems & Service-oriented techniques
- IPTV and content distribution networks
- User-centric networking and services
- multimedia indexing and retrieval
- Personalized access to media systems
- Context/content-aware services
- Smart Homes and E-Health
- Web Commerce & Services, Data models, Web searching & querying
- Web Mining & Web Semantics
- Web service based Grid computing and P2P computing
- Advanced identification techniques (Biometrics, RFID, etc.)
- Virtualization technologies for grid and parallel computing.
- Interactive media, voice and video, games, immersive applications
- Network virtualization, virtual private networks (VPN), and services
- VoIP protocols and services
- Content-based networking: caching, distribution, load balancing,
- Mobile/wireless content distribution

Related Resources

NTMS 2018   9th IFIP International Conference on New Technologies, Mobility and Security - 26 - 28 February 2018, Paris - France
AI 2017   3rd International Conference on Artificial Intelligence and Applications
NAACL HLT 2018   The 16th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies
IJCI 2017   International Journal on Cybernetics & Informatics
TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
FoIKS 2018   10th International Symposium on Foundations of Information and Knowledge Systems
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
CNSA 2018   11th International Conference on Security and its Applications
BSC 2018   IFIP NTMS 1st International Workshop on Blockchains and Smart Contracts (BSC)
SACMAT 2018   23rd ACM Symposium on Access Control Models and Technologies