posted by user: chhagan || 4931 views || tracked by 11 users: [display]

ACM WiSec 2017 : ACM Conference on Security and Privacy in Wireless and Mobile Networks

FacebookTwitterLinkedInGoogle

Link: http://wisec2017.ccs.neu.edu/
 
When Jul 18, 2017 - Jul 20, 2017
Where Boston, USA
Abstract Registration Due Mar 13, 2017
Submission Deadline Mar 20, 2017
Notification Due Apr 24, 2017
Final Version Due May 29, 2017
 

Call For Papers

ACM WiSec 2017 will run from July 18 to July 20, 2017 in Boston, USA.

ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the security and privacy of mobile software platforms, usable security and privacy, biometrics, cryptography, and the increasingly diverse range of mobile or wireless applications such as Internet of Things, and Cyber-Physical Systems. The conference welcomes both theoretical as well as systems contributions.

Topics of interest include, but are not limited to:

Security & privacy for smart devices (e.g., smartphones)
Wireless and mobile privacy and anonymity
Secure localization and location privacy
Cellular network fraud and security
Jamming attacks and defenses
Key management (agreement or distribution) for wireless or mobile systems
Information-theoretic security schemes for wireless systems
Theoretical and formal approaches for wireless and mobile security
Cryptographic primitives for wireless and mobile security
NFC and smart payment applications
Security and privacy for mobile sensing systems
Wireless or mobile security for emerging applications (e.g, privacy in health, automotive, avionics, smart grid, or IoT applications)
Physical tracking security and privacy
Usable mobile security and privacy
Economics of mobile security and privacy
Bring Your Own Device (BYOD) security
Mobile malware and platform security
Security for cognitive radio and dynamic spectrum access systems
Security protocols for wireless networking

The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by the ACM.
Full and short papers

Full paper submissions to ACM WiSec 2016 can be up to 10 pages in the ACM conference style excluding the bibliography and well marked appendices, and up to 12 pages in total. ACM WiSec also encourages the submission of short papers with a length of up to 6 pages, which describe mature work of a more succinct nature. All papers must be thoroughly anonymized for double-blind reviewing. Detailed submission instructions will appear on the conference website.
New at WiSec 2017

OPINION PAPERS: ACM WiSec 2017 invites papers (ACM conference style, up to 3 pages excluding references) that present personal perspectives on all aspects of security and privacy in wireless and mobile networks. Opinion papers could also criticize previous research or research directions, as well as highlight possible promising research directions. The opinions expressed in these papers are expected to be anyway corroborated by theoretical foundations, experiments, or experiences. Like the regular papers, the opinion papers will be reviewed by the WiSec Technical Program Committee. The selected opinion papers will be a part of the WiSec technical program and will be published in the conference proceedings. Opinion papers should be submitted using the same submission procedure adopted for the full papers. The title of these papers must have the prefix "Opinion:".
New at WiSec 2017

WiSec REPRODUCIBILITY LABEL: This year WiSec is pioneering a process to support greater reproducibility in mobile and wireless security experimental research. The goal of this process is to increase the impact of mobile and wireless research, enable dissemination of research results, sharing of code and experiments set-ups, and to enable the research community to build on prior experimental results. Towards this goal, Wisec is introducing a reproducibility label to recognize papers whose results were reproduced by an independent group of researchers. Authors of accepted papers, can participate in this voluntary process by submitting their experiments following the reproducibility evaluation instructions. Authors are encouraged to plan ahead when running their experiments to minimize the overhead of applying for this label.
Posters and Demos

WiSec also solicits submission of posters and demos.
Important deadlines

Abstract submission: March 13, 2017
Paper submission: March 20, 2017
Notification to authors: April 24, 2017
Poster and demo proposal submission: May 17, 2017
Notification to poster presenters: May 19, 2017
Camera-ready version: May 29, 2017

All deadlines are 11:59:59 EDT.
Double submissions

It is a policy of the ACM to disallow double submissions, where the same (or substantially similar) paper is concurrently submitted to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved.

Related Resources

ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
ACM AICCC 2024   ACM--2024 7th Artificial Intelligence and Cloud Computing Conference (AICCC 2024)
ACM ICNCC 2024   ACM--2024 The 13th International Conference on Networks, Communication and Computing (ICNCC 2024)
ICBTA 2024   ACM--2024 7th International Conference on Blockchain Technology and Applications (ICBTA 2024)
ACM ICCNS 2024   ACM--2024 14th International Conference on Communication and Network Security (ICCNS 2024)
ICCIP 2024   ACM--2024 10th International Conference on Communication and Information Processing (ICCIP 2024)
ICISE 2024   ACM--2024 9th International Conference on Information Systems Engineering (ICISE 2024)
ICIT 2024   ACM--2024 The 12th International Conference on Information Technology: IoT and Smart City (ICIT 2024)
SSIP 2024   ACM--2024 7th International Conference on Sensors, Signal and Image Processing (SSIP 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust