posted by system || 7416 views || tracked by 20 users: [display]

WiSec 2010 : The Third ACM Conference on Wireless Network Security

FacebookTwitterLinkedInGoogle


Conference Series : Wireless Network Security
 
Link: http://www.sigsac.org/wisec/WiSec2010
 
When Mar 22, 2010 - Mar 24, 2010
Where Hoboken, NJ, USA
Submission Deadline Sep 21, 2009
Notification Due Nov 30, 2009
Final Version Due Jan 6, 2010
Categories    security   wireless
 

Call For Papers

---------------------------------------------------------------------
The Third ACM Conference on Wireless Network Security

ACM WiSec '10

March 22-24, 2010
Stevens Institute of Technology, Hoboken, NJ, USA
http://www.sigsac.org/wisec/WiSec2010
---------------------------------------------------------------------
*** CALL FOR PAPERS ***

As wireless networks become ubiquitous, their security gains in
importance. The ACM Conference on Wireless Network Security (WiSec) aims
at exploring attacks on wireless networks as well as techniques to thwart
them. The considered networks encompass cellular, metropolitan, local
area, vehicular, ad hoc, satellite, underwater, cognitive radio, and
sensor networks, as well as RFID.

ACM WiSec results from the merger of three workshops: ESAS (European
Workshop on the Security of Ad Hoc and Sensor Networks), SASN (ACM
Workshop on the Security of Ad Hoc and Sensor Networks) and WiSe (ACM
Workshop on Wireless Security).
The proceedings will be published by the ACM.

Important Dates:
Submission due: September 21, 2009
Notification of acceptance: November 30, 2009
Camera-ready version due: January 6, 2010
Conference: March 22-24, 2010

Topics of interest include, but are not limited to:

* Naming and addressing vulnerabilities
* Key management in wireless/mobile environments
* Secure neighbor discovery / Secure localization
* Secure PHY and MAC protocols
* Trust establishment
* Intrusion detection, detection of malicious behavior
* Revocation of malicious parties
* Denial of service
* User privacy, location privacy
* Anonymity, prevention of traffic analysis
* Identity theft and phishing in mobile networks
* Charging
* Cooperation and prevention of non-cooperative behavior
* Economics of wireless security
* Vulnerability and attack modeling
* Incentive-aware secure protocol design
* Jamming/Anti-jamming communication
* Cross-layer design for security
* Monitoring and surveillance
* Cryptographic primitives for wireless communication
* Formal methods for wireless security
* Mobile platform and systems (OS and application) security

General Chair:
Susanne Wetzel Stevens Institute of Technology, USA

Program Committee Co-chairs:
Cristina Nita-Rotaru Purdue University, USA
Frank Stajano University of Cambridge, UK

Publicity Chair:
Reza Curtmola New Jersey Institute of Technology, USA

Web/Publication Chair:
Jing Dong Purdue Univeristy, USA

Steering Committee:
Jean-Pierre Hubaux, EPFL, Switzerland (chair)
Claude Castelluccia, INRIA, France
Douglas Maughan, DHS/HSARPA, USA
Adrian Perrig, Carnegie Mellon University, USA
Nitin Vaidya, University of Illinois, USA
Dirk Westhoff, NEC Europe Network Lab, Germany
Levente Buttyan, BME, Hungary
Virgil Gligor, University of Maryland, USA
Peng Ning, North Carolina State University, USA
Radha Poovendran, University of Washington, USA
Cliff Wang, Army Research Office, USA

Related Resources

ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
WWW 2025   The Web Conference
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
DRIJ 2024   Dental Research: An International Journal
AIMDS 2024   International Conference on AI, Machine Learning and Data Science
ICISPP--Ei 2025   2025 6th International Conference on Information Security and Privacy Protection (ICISPP 2025)
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3