| ²é¿´: 222 | »Ø¸´: 0 | |||
| µ±Ç°Ö÷ÌâÒѾ´æµµ¡£ | |||
donghai5160ͳæ (³õÈëÎÄ̳)
|
[½»Á÷]
[2010-Mar-10][IEEE]2010ÎÞÏßÍøÂ簲ȫ¹ú¼Ê»áÒé(³¤´º)MWNS2010
|
||
|
2010 International workshop on Mobile Wireless Network Security (MWNS 2010) August 18-12, 2010, Changchun, China. http://www-nishio.ist.osaka-u.ac ... kshop/MWNS2010.html Submission deadline: February 15, 2010 ============================================================ In conjunction with The 5th International Conference on Frontier of Computer Science and Technology (FCST 2010) http://ccst.jlu.edu.cn/fcst/ ============================================================ CALL FOR PAPERS ============================================================ OVERVIEW: The mobile wireless networks are regarded as the key underlying infrastructures for realizing the next generation networking and computing, such as the clouding computing, the ubiquitous computing and the 4G networks. In this context, mobile and wireless communications are more vulnerable than the wired networks to different attacks such as denial of service, man in the middle, hijacking, spoofing, etc. In addition, they have less resources, which is a real problem in security solution design. These unique characteristics of the mobile wireless networks pose a number of challenges in terms of security. We need to design secure and robust solutions which are light enough to be supported by those wireless and mobile terminals and communications. Addressing these challenging issues can provide better secure services and increase the overall performance. This workshop aims to identify and explore the different issues and challenges related to security aspects in mobile wireless networks. Such as, what are the benefits or inconvenience of mobility on security? What are the appropriate mobility models to have a good level of security? Are Classical IDS approaches appropriate for mobile environments? How can we build up trusted platforms and trustworthy systems for mobile wireless networks? This workshop will be held in conjunction with the 5th International Conference on Frontier of Computer Science and Technology (FCST 2010), an ideal vehicle for bringing together researchers, scientists, engineers, academics and students all around the world to share the latest updates on new security technologies that would shape the next generation of mobile wireless systems and technology platforms. Submission Topics: We are interested in the areas, but are not limited to, the following topics : * Trust management in mobile wireless networks * Risk management in mobile wireless networks * Privacy in mobile wireless networks * Cryptographic devices for mobile wireless networks * Key management in mobile wireless networks * Authentication in mobile wireless networks * Access control in mobile wireless networks * Anonymity in mobile wireless networks * Reliability and fault tolerance in mobile wireless networks * Secure mobile routing protocols * Security under resource constraints * Performance and security trade-offs in mobile wireless networks * Intrusion detection in mobile wireless networks * Secure mobile location services * Denial of service in mobile wireless networks Guideline for Authors: Please submit your paper(s) in PDF format to: Lei Shu, lei.shu@ieee.org, and Weiwei Yuan, weiwei@oslab.khu.ac.kr All submissions will be reviewed by the technical program committee and will be judged by their technical merit and relevance to workshop. Submissions should include abstract, 5-10 keywords, and the e-mail address of the corresponding author and be in PDF format. Each submission must not exceed 6 pages in the IEEE ''8.5x11'' two-column format with 10-12 point font, including tables and figures[Latex][Doc]. Submitted papers must be original work that has not appeared in and is not under consideration for another conference or a journal. At least one of the authors must attend the conference to present the work in order that the accepted paper can be put into digital library. IMPORTANT DATES: Paper submission due: March 10, 2010 Acceptance notification: April 20, 2010 Camera-ready due: May 20, 2010 Author registration: May 20, 2010 Workshop: August 18-22 2010 |
» ²ÂÄãϲ»¶
Çóµ÷¼Á
ÒѾÓÐ7È˻ظ´
272Çóµ÷¼Á
ÒѾÓÐ7È˻ظ´
352·Ö »¯¹¤Óë²ÄÁÏ
ÒѾÓÐ3È˻ظ´
0703»¯Ñ§
ÒѾÓÐ6È˻ظ´
Ò»Ö¾Ô¸Äϲý´óѧ324Çóµ÷¼Á
ÒѾÓÐ3È˻ظ´
Çóµ÷¼Á
ÒѾÓÐ3È˻ظ´
266·ÖÇó²ÄÁÏ»¯¹¤Ò±½ð¿óÒµµÈרҵµÄµ÷¼Á
ÒѾÓÐ4È˻ظ´
Ò»Ö¾Ô¸ÄÏʦ´ó0703»¯Ñ§ 275Çóµ÷¼Á
ÒѾÓÐ4È˻ظ´
085701»·¾³¹¤³ÌÇóµ÷¼Á
ÒѾÓÐ3È˻ظ´
266Çóµ÷¼Á
ÒѾÓÐ10È˻ظ´














»Ø¸´´ËÂ¥