posted by organizer: butlerufl || 1412 views || tracked by 8 users: [display]

WiSec 2018 : ACM Conference on Security and Privacy in Wireless and Mobile Networks


Conference Series : Wireless Network Security
When Jun 18, 2018 - Jun 20, 2018
Where Stockholm, Sweden
Submission Deadline Mar 1, 2018
Notification Due Apr 2, 2018
Final Version Due Apr 30, 2014
Categories    security   mobile   wireless   networks

Call For Papers

ACM WiSec 2018 will run from June 18 to June 20, 2018 in Stockholm, Sweden.

ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the security and privacy of mobile software platforms, usable security and privacy, biometrics, cryptography, and the increasingly diverse range of mobile or wireless applications such as Internet of Things, and Cyber-Physical Systems. The conference welcomes both theoretical as well as systems contributions.

Topics of interest include, but are not limited to:

- Security & privacy for smart devices (e.g., smartphones)
- Wireless and mobile privacy and anonymity
- Secure localization and location privacy
- Cellular network fraud and security
- Jamming attacks and defenses
- Key management (agreement or distribution) for wireless or mobile systems
- Information-theoretic security schemes for wireless systems
- Theoretical and formal approaches for wireless and mobile security
- Cryptographic primitives for wireless and mobile security
- NFC and smart payment applications
- Security and privacy for mobile sensing systems
- Wireless or mobile security for emerging applications (e.g, privacy in health, automotive, avionics, smart grid, or IoT applications)
- Physical tracking security and privacy
- Usable mobile security and privacy
- Economics of mobile security and privacy
- Bring Your Own Device (BYOD) security
- Mobile malware and platform security
- Security for cognitive radio and dynamic spectrum access systems
- Security protocols for wireless networking

The proceedings of ACM WiSec, sponsored by SIGSAC, will be published by the ACM.

Full and short papers

Full paper submissions to ACM WiSec 2018 can be up to 10 pages in the ACM conference style excluding the bibliography and well marked appendices, and up to 12 pages in total. ACM WiSec also encourages the submission of short papers with a length of up to 6 pages, which describe mature work of a more succinct nature. All papers must be thoroughly anonymized for double-blind reviewing. Detailed submission instructions will appear on the conference website.

Opinion papers

ACM WiSec 2018 invites papers (ACM conference style, up to 3 pages excluding references) that present personal perspectives on all aspects of security and privacy in wireless and mobile networks. Opinion papers could also criticize previous research or research directions, as well as highlight possible promising research directions. The opinions expressed in these papers are expected to be anyway corroborated by theoretical foundations, experiments, or experiences. Like the regular papers, the opinion papers will be reviewed by the WiSec Technical Program Committee. The selected opinion papers will be a part of the WiSec technical program and will be published in the conference proceedings. Opinion papers should be submitted using the same submission procedure adopted for the full papers. The title of these papers must have the prefix "Opinion:".

Reproducibility label

This year is the second one in a row for a new effort to support greater reproducibility in mobile and wireless security experimental research. The goal of this process is to increase the impact of mobile and wireless research, enable dissemination of research results, sharing of code and experiments set-ups, and to enable the research community to build on prior experimental results. Towards this goal, Wisec is introducing a reproducibility label to recognize papers whose results were reproduced by an independent group of researchers. Authors of accepted papers, can participate in this voluntary process by submitting their experiments following the reproducibility evaluation instructions. Authors are encouraged to plan ahead when running their experiments to minimize the overhead of applying for this label.

Posters and Demos

WiSec also solicits submission of posters and demos.

Double submissions

It is a policy of the ACM to disallow double submissions, where the same (or substantially similar) paper is concurrently submitted to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved.

Related Resources

FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ITNAC 2018   The 28th International Telecommunication Networks and Application Conference (ITNAC 2018)
IJOE 2018   International Journal on Organic Electronics
Journal of Computer Networks 2018   Special Issue: Security and Privacy for the Internet of Things, Elsevier Journal of Computer Networks
IJIS-IoTSec 2018   Springer IJIS Special Issue on IoT Security and Privacy
IJASUC 2018   International Journal of Ad hoc, Sensor & Ubiquitous Computing
WiOpt 2018   WiOpt 2018, The 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
COCOA 2018   The 12th Annual International Conference on Combinatorial Optimization and Applications
AINTEC 2018   14th Asian Internet Engineering Conference (in cooperation with ACM SIGCOMM)
SPIoT 2018   The 7th International Symposium on Security and Privacy on Internet of Things