posted by user: tnhh || 3934 views || tracked by 9 users: [display]

Mobisec 2010 : The Second International ICST Conference on Security and Privacy in Mobile Information and Communication Systems


Conference Series : Security and Privacy in Mobile Information and Communication Systems
When May 26, 2010 - May 28, 2010
Where Catania, Sicily
Submission Deadline Jan 11, 2010
Notification Due Mar 15, 2010
Final Version Due Apr 5, 2010
Categories    mobile   security   privacy

Call For Papers


MobiSec's focus is the convergence of information and communication technology in mobile scenarios. This convergence is realised in intelligent mobile devices, accompanied by the advent of converged, and next-generation, communication networks. As mobile communication and information processing becomes a commodity, economy and society require protection of this precious resource. Mobility and trust in networking go hand in hand for future generations of users, who need privacy and security at all layers of technology. MobiSec strives to bring together the leading-edge of academia and industry in mobile systems security, as well as practitioners, standards developers and policymakers.


Technical papers describing original, previously unpublished research, not currently under review by another conference or journal, are solicited. MobiSec solicits original, high-quality research contributions in the form of full papers. The focus is on the security of information and communication systems including mobile networks, devices and applications. Papers from other areas, e.g., formal methods, cryptography, database security, operating system security, will be considered if a clear connection to one of the topics below is demonstrated.

Topics of interest include, but are not limited to the following focus areas, as applied to mobile ICT:
Security architectures for next-generation, new-generation, and converged communication networks
Trusted mobile devices, hardware security
Network resilience
Threat analyses for mobile systems
Multi-hop authentication and trust
Non-repudiation of communication
Context-aware and data-centric security
Protection and safety of distributed mobile data
Mobile application security
Security for voice and multimedia communication Machine-to-machine communication security
Trust in autonomic and opportunistic communication
Location based applications security and privacy
Security for the networked home environment
Security and privacy for mobile communities
Mobile emergency communication, public safety
Lawful interception and mandatory data retention
Security aspects in IP-based mobility
Security of mobile agents and code
Idenity management
Embedded security


Proposals for panels/workshops/tutorials are solicited. Potential organisers are welcome to submit a proposal to the Workshops Chair, the Panels Chair, or one of the general chairs.

Panels Chair Dirk Kröselberg
Workshops Chair Vincent Naessens
General Chairs Andreas U. Schmidt, Giovanni Russello

Accepted papers will be published by Springer in the MobiSec Conference Proceedings, in the Lecture Notes of the Institute for ComputerSciences, Social-Informatics and Tele-communications Engineering (LNICST) series. The proceedings will be available both as paper-based copies and via Springerlink, Springer's digital library. In addition, the content of the proceedings will be reviewed by various indexing services such as the DBLP database, ZBlMath/CompuServe, MATHSCINET, EI- INSPEC, IET, RPS, Computer Science Bibliography Administrator, Elsevier Bibliographic Databases Source Management, ULRICH, CSA, ProQuest.
Special Issues

Selected high-quality papers will be invited to special issues of prestigious international journals
Paper Submission

Paper submission will be handled electronically. Authors should prepare an Adobe Acrobat PDF version of their full paper. All submitted papers will be subject to a rigorous peer- review. Papers must be formatted using Springer LNICST Authors' Kit and submitted only through the ASSYST conference management system.
For instructions see Submission Guidelines

Papers must not exceed the limit of 12 pages including text, figures and references. The font size must be at least 10 points.
Important Dates

Paper Submission Deadline: January 11, 2010

Notification of Acceptance: March 15, 2010

Camera Ready Deadline: April 5, 2010

Conference: May 26-28, 2010 Catania, Sicily

Related Resources

ICST 2020   13th IEEE Conference on Software Testing, Validation and Verification
PST 2020   18th Annual International Conference on Privacy, Security, and Trust (PST2020)
CANS 2020   Cryptology and Network Security
AVC 2020   Advances in Vision Computing: An International Journal
CCNET 2020   7th International Conference on Computer Networks & Communications
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
ECICT 2020   2020 2nd Euro-Asia Conference on Information and Communication Technology (ECICT 2020)
SPIoT 2020   9th International Symposium on Security and Privacy on the Internet of Things
NISecurity 2021   2021 International Conference on Network and Information Security (NISecurity 2021)
CPCS 2020   Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses