posted by user: ntms1 || 4331 views || tracked by 12 users: [display]

NTMS 2015 : Seventh IFIP International Conference on New Technologies, Mobility and Security


Conference Series : New Technologies, Mobility and Security
When Jul 26, 2015 - Jul 29, 2015
Where Paris, France
Submission Deadline Mar 1, 2015
Notification Due May 9, 2015
Final Version Due May 25, 2015
Categories    new technologies   mobility   security

Call For Papers

Seventh IFIP International Conference on
New Technologies, Mobility and Security
26-29 July 2015, PARIS, FRANCE

NTMS'2015 is the Seventh IFIP International Conference on New
Technologies, Mobility and Security that will be held in Paris, France
from 26 to 29 July 2015.

NTMS'2015 aims at fostering advances in the areas of New Technologies,
Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS,
Network Security and E-commerce, to mention a few, and provides a
dynamic forum for researchers, students and professionals to present
their state-of-the-art research and development in these interesting

The event will be combined with tutorial sessions and workshops.
Tutorials will precede the main program, aiming at the dissemination of
mature knowledge and technology advances in the field. Two or more
Workshops will immediately follow the main conference, offering the
opportunity for a more focused exchange of ideas and presentation of on
going research relevant to following tracks (More information and the
full call-for-papers can be found on the conference web):

Track 1 : Mobility & Wireless networks
- Beyond 3G, 4G, LTE, and WiMAX Networks
- Wireless Local Area Networks
- Wireless Personal Area Networks
- Wireless Ad Hoc and Mesh Networks
- Wireless Vehicular Networks
- Cognitive Radio Networks
- Satellite Networks
- Self-organizing and Re-configurable Wireless Networks
- Energy Efficient Wireless Sensor Network Solutions
- Wireless MAC Protocols
- Scheduling Techniques for Wireless Networks
- Wireless QoS Routing Algorithms
- Radio Resource Allocation and Management
- Cross-layer Design and Optimization in Wireless Networks
- Clustering, Topology Control, Coverage and Connectivity
- Cooperation and Relaying in Wireless Networks
- Analysis, Simulation and Performance Evaluation
- Integration of Heterogeneous Mobile, Wireless and Wire-line Radio
Access Networks
- Mobility, Location Management and Handover Techniques for Wireless
Mobile Networks
- Multimedia over Wireless and Mobile Systems
- Power-aware Architectures, Algorithms and Protocols for Wireless and
Mobile Networks
- Wireless Services and Middleware Platforms
- Green Radio Communications
- Measurements, Testbeds and Deployment of Wireless Systems

Track 2: Security

Thematic areas:
- Security engineering. Methodologies, formalisms, modeling, tools,
code instrumentation
- Cryptography. Algorithms, protocols, attacks
- Security in distributed systems.
- Cryptographic Hardware and Embedded Systems.
- Light-weight cryptography.
- Information Hiding.
- Steganography
- Privacy and Anonymity.
- Security assurance. Evaluation, testing, formal proofs, certification.
- Quantum Cryptography and QKD.
- Trusted computing. Analyses and attacks, practical applications...
- Surveillance and monitoring. Intrusion detection, monitoring
techniques, architectures,...
- Infrastructure. Middleware, proxies, PKIs, AAAs, SSO, credentials...
- Social and psychological aspects of security. User-centered security
evaluation, perception of security and threats...
- Security and usability.

Application areas:
- Service Oriented Computing. Platform security, access control,
Security of the SOC processes (Negotiation, Orchestration),
Identification of services...
- Cloud computing. Platform security, data protection, software
protection, surveillance and dynamic reaction.
- Ubiquitous computing, pervasive computing and ambient intelligence.
Secure system models, development support, dynamic reaction, self-
- Embedded systems. Dynamic replaceability, system security assessment,
secure system composition, tampering-resistance...
- Security in system evolution. Design for secure evolution, evolution
oriented surveillance, security patches...
- Critical infrastructures. Protection architectures, redundancy and
replication, scalability issues...

Track 3: New Technologies & services
- New generation Internet, Post IP and IPv6
- NGN architectures, protocols and services management and delivery
- Web 2.0 applications and IMS (IP Multimedia Subsystems)
- Next generation systems & Service-oriented techniques
- IPTV and content distribution networks
- User-centric networking and services
- multimedia indexing and retrieval
- Personalized access to media systems
- Context/content-aware services
- Smart Cities, Homes and E-Health
- Web Commerce & Services, Data models, Web searching & querying
- Web Mining & Web Semantics
- Web service based Grid computing and P2P computing
- Advanced identification techniques (Biometrics, RFID, etc.)
- Virtualization technologies for grid and parallel computing.
- Interactive media, voice and video, games, immersive applications
- Network virtualization, virtual private networks (VPN), and services
- VoIP protocols and services
- Content-based networking: caching, distribution, load balancing,
- Mobile/wireless content distribution
- Flying Ad-Hoc Networks
- Services and Support for Smart Cities
- Intelligent Traffic Information Services
- Vehicular Networks and Applications

* * * * *
Submission Instructions
Papers should be in English, strictly not exceeding 5 double-column
pages (3,000 words), in Adobe PDF format (which is the only accepted
format for NTMS 2015).

To access the full list of topics, submission guidelines, as well as
venue and travel information please visit:

Workshop proposals should provide sufficient information to evaluate
the quality and importance of the topic, the goals of the workshop, and
the size of the interested community.

Proposals should identify one or more chairs and several other
individuals willing to serve on an organizing committee and assist with
publicity and reviewing.

Proposals should be 2-4 pages and contain at least the workshop
description, goals, potential participants and list of organizers.

submission Deadline: March 1, 2015
Acceptance Notification: May 9, 2015
Camera-Ready: May 25, 2015

Workshops proposals
Workshop Submission/Proposal deadline: 5 January 2015
Notification: 15 January 2015

Demo Session important dates
Submission deadline: 20 February 2015
Notification of acceptance: 10 March 2015

Tutorial/Keynotes proposals
Submission/Proposal deadline: 1 April 2015
Notification: 15 April 2015

General Chair
Azzedine Boukerche, University of Ottawa, Canada

General co-Chair
Pascal Urien, Telecom ParisTech, France

TPC Chair
Jalel Ben-Othman, Universiy Paris 13, France

TPC co-Chairs (New Technologies Track)
Leandro Villas, University of Campinas, Brazil
AbdelHamid Mammeri, DIVA Strategic Networks, Univ. of Ottawa, Canada

TPC co-Chairs (Mobility/Wireless Track)
Steven Martin, LRI, Paris-Sud University/CNRS, France

TPC co-Chairs (Security Track)
Felix Gomez Marmol from NEC Research Labs, Germany
Gregorio Martinez Perez, University of Murcia, Spain

Tutorial/Keynote Chair
Stefano Secci, LIP6, France
Luis Henrique M K Costa, Federal University of Rio de Janeiro, Brazil

workshop Chair
Leandro Villas, Campinas University, Brazil

Finance Chair
Ibrahim Hajjeh, Fransec, France

Publicity Chair
Mohamad Badra, Zayed University, UAE

Sponsors Chair
Khaldoun Al Agha, Université Paris-Sud, France

Local Organization chair
Layth Slimane, EFREI-Villejuif, France

Related Resources

NTMS 2016   8th IFIP International Conference on New Technologies, Mobility and Security
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
ACISP 2017   Australasian Conference on Information Security and Privacy
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
WICSPIT 2017   IoTBDS/SMARTGREENS Workshop -- Innovative CyberSecurity and Privacy for Internet of Things: Strategies, Technologies, and Implementations
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
PETS-Fourth-Issue 2017   17th Privacy Enhancing Technologies Symposium
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
IFIP SEC 2017   32nd IFIP TC-11 International Information Security and Privacy Conference