| 查看: 1253 | 回复: 53 | |||||||||
| 当前只显示满足指定条件的回帖,点击这里查看本话题的所有回帖 | |||||||||
[交流]
【2015-03-18】MobiPST 2015
|
|||||||||
General Information The 5th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2015) will be held in conjunction with the 24th International Conference on Computer Communications and Networks (ICCCN 2015), in Las Vegas, Nevada, USA. All papers presented in MobiPST 2015 will be published in the workshop proceedings. Outstanding papers will be invited to extend to full version for a SCI(E)-indexed journal, which is currently under contact. Scope and Topics Recently, mobile wireless devices, such as wireless sensors, smart tags, smart pads, tablets, PDAs and smart phones, have become pervasive and attracted significant interest from academia, industry, and standard organizations. With the latest cloud computing technology, those mobile wireless devices will play a more and more important role in computing and communication. When those devices become pervasive, security, privacy and trust become critical components for the acceptance of applications build based on those devices. Moreover, several favorable characteristics of mobile and wireless devices, including portability, mobility, and sensitivity, further impose the challenge of security and privacy in those systems. Despite recent advances, many research issues still remain in the design of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. For example, when mobile devices have more storage space, high bandwidth, and super sensing capability, more sensitive information will be stored in those devices. On the other hand, operating systems running on those devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of those devices. With more mobile devices being used in social networks and traditional web-based systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged by considering the special characteristics of mobile and wireless devices. Other issues such as malware, cyber threat, intrusion detection, attack modeling, security analysis, identity management and anonymity techniques also need to be revisited in mobile and wireless systems. This workshop aims to bring together the technologists and researchers who share interest in the area of security, privacy and trust in mobile and wireless systems, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the models and designs of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications, as well as analysis on cyber threat in mobile and wireless systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical, experimental research, and work in-progress for security, privacy and trust related issues in the context of mobile and wireless systems that include, but are not limited to, the following: Cryptography for Mobile and Wireless Systems Wireless Local Area Networks Wireless Sensor Networks Wireless Mesh Networks Wireless Ad-hoc Networks Vehicular Networks Body-area Networks Cellular Networks (3G, 4G, …) WiMAX Networks Machine to Machine (M2M) Netwroks Software Defined Networks (SDN) Social Networks Smart Grid RFID-based Systems Mobile Cloud Cyber-Physical Systems (CPS) Internet of Things Location-based Service Systems Mobile Healthcare Systems Smart Building Systems Big Data Important Dates Paper submission due: March 8, 2015 Acceptance notification: April 24, 2015 Camera-ready due: May 8, 2015 (FIRM) Workshop: August 3-6, 2015 Submissions and Publications Authors are invited to submit manuscripts reporting original unpublished research and recent developments in the topics related to the workshop. Submissions should include a title, abstract, keywords, author(s) and affiliation(s) with postal and e-mail address(es) of the corresponding author. Submitted manuscripts must be formatted in standard IEEE camera-ready format (double-column, 10-pt font) and must be submitted via EasyChair (https://www.easychair.org/) as PDF files (formatted for 8.5x11-inch paper). The manuscripts should be no longer than 6 pages. Two additional page is permitted if the authors are willing to pay an over-length charge at the time of publication (manuscripts should not exceed 8 pages). Submitted papers cannot have been previously published in or be under consideration for publication in another journal or conference. The workshop Program Committee reserves the right to not review papers that either exceed the length specification or have been submitted or published elsewhere. Submissions must include a title, abstract, keywords, author(s) and affiliation(s) with postal and e-mail address(es). All authors of a paper must be registered in the RIGHT order via EasyChair at the SUBMISSION TIME and cannot be changed after the submission due time at EasyChair. The paper title and author name list/order cannot be changed during the final camera-ready submission. Submitted papers will be reviewed by the workshop Program Committee and judged on originality, technical correctness, relevance, and quality of presentation and the comments will be provided to the authors. Workshop papers will be in the same proceedings of the main conference papers. An accepted paper must be presented at the ICCCN 2015 venue by one of the authors registered at the full registration rate. If any accepted paper is not registered, the paper will be removed from the workshop program and the proceedings. Each workshop registration covers up to two workshop papers by an author. Accepted and registered papers will be published in proceedings that will be available through Xplore. Papers that are not presented at the ICCCN 2015 venue by one of the registered co-authors will not appear in Xplore. When uploading a camera-ready at IEEE, note that the paper title, author names/affiliation and order must be IDENTICAL to the original submission for peer reviewing. No title change, author addition or removal is allowed. A paper must be registered by a co-author in the full rate. It must be presented by one of registered authors in the venue. Camera-ready and registration due date May 8, 2015 is FIRM. Check ICCCN homepage to find detailed instructions. Please try to complete the process as early as possible in order to avoid the rush hour, giving you time to deal with unexpected but possible issues/delay. Special Issue for Outstanding Papers Authors of outstanding papers will be invited to submit an extended version for a Special Issue on "Challenges and Solutions in Mobile Systems Security", organized in the Journal of Computers and Electrical Engineering, Elsevier. The targeted publication date for the Special Issue is July 2016. [ Last edited by Paulwolf on 2015-3-2 at 22:56 ] |
» 猜你喜欢
论文终于录用啦!满足毕业条件了
已经有12人回复
2025年遐想
已经有4人回复
投稿Elsevier的杂志(返修),总是在选择OA和subscription界面被踢皮球
已经有8人回复
求个博导看看
已经有18人回复
» 抢金币啦!回帖就可以得到:
福建师范大学柔性电子学院招收2026年博士(储能材料与柔性电子器件)
+1/85
中科院长春光机所 招收计算材料学博士/硕士研究生(含机器学习辅助材料设计方向)
+1/77
山东征女友,坐标济南
+1/64
南科大薛亚辉课题组诚聘离子输运、低维器件、原子力显微镜等方向“快响行动”博士生
+1/38
西北工业大学无人飞行器技术全国重点实验室拟招收电机/自动化方向博士1~2名
+1/31
【AI、水文方向】香港科技大学(广州)研究助理招聘
+1/26
2026年黄河科技学院纳米功能材料研究所招聘
+2/18
复旦大学聂志鸿团队招聘聚电解质方向博士后和科研助理
+1/10
武汉纺织大学张兆威课题组与华中科技大学联合招聘博士后
+1/10
海南大学化学院—功能分子器件团队2026博士/研究助理招生
+1/8
电子科技大学激光与光子制造团队招硕士博士
+1/7
上海交通大学化学化工学院张智涛课题组诚聘博士后
+1/7
求博导收留
+1/5
上海大学张进教授课题组诚招2026年秋季博士研究生
+1/5
海南大学化学院—功能分子器件团队博士后招聘
+1/4
澳门科技大学诚招纳米材料/水凝胶方向博士研究生(2026年秋-updated)
+1/4
长春工业大学机电工程学院韩玲教授招收审核制2026年秋季入学博士生
+1/4
中国科学院苏州纳米所院士团队博士后岗位招聘
+1/3
西南交通大学李义兵课题组博士及博士后招聘
+1/2
👉划重点!硼替佐米药物研发质控必备
+1/1







回复此楼