Call for papers - WiSec 2006
am 28.03.2006 22:24:55 von SantoshDear colleagues,
I would like to invite you all to WiSec, Workshop on Security in
Wireless
Networks. Contribution for this workshop is encouraged. Please find the
details
below.
Thank You.
Santosh.
************************************************************ *
Call for Papers
First International Workshop on Security in Wireless Networks
(co-located with WICON2006, Boston, Aug 1-5, 2006)
Important Dates
Full Papers due: May 15, 2006 Midnight US EST
Notification of Acceptance: June 10, 2006
Camera-ready Manuscripts due: June 23, 2006
Conference Dates: August 5, 2006
************************************************************ *
The aim of this workshop is to bring together the work done by
practitioners
as well as researchers in understanding the practical and theoretical
issues
related to all aspects of wireless security such as implementation,
deployment,
application and usage in these wireless networks that hold promise for
commercial
deployment. The scope of the workshop will range over all topics
related to the
development and deployment of solutions to current issues in wireless
security.
We seek original, previously unpublished and completed contributions
not currently
under review elsewhere. The workshop will include contributed technical
papers,
invited papers, panel discussions and tools demonstrations. Areas of
interest
include a variety of topics related to security in wireless networks
including,
but not limited to:
* Cellular networks
* WiMax networks
* Vehicular networks
* Intrusion Detection
* Self-monitoring/self-healing wireless networks
* Denial of Service attacks and prevention
* Secure group communication/multicast
* Security considerations for resource constrained devices
* Cross-layer network attacks and mitigation
* Privacy, contract agreements and Payment systems
* Redundancy and security
* Dependability/Security optimization and adaptive control
* Role of Biometrics
* Novel Threats/attacks/Vulnerabilities
* Public key infrastructure implementation
* Intrusion tolerant mechanisms
* Secure Routing protocols
* Network controlled secure physical reconfiguration
* WLAN/2G/3G/4G/Bluetooth networks
* Reasoning about Trust in wireless environment
* Tools for Analysis and Verification of Protocols
* Wireless security protocols (TKIP, CCMP)
Submission Instructions
-----------------------
Prospective authors are encouraged to submit a PDF version of the full
paper
in English language. Papers must be unpublished and must not be
submitted
for publication elsewhere. Papers are limited to 5 two-column pages, in
a
font no smaller than 10-points, IEEE conference proceedings format.
Papers
should be submitted to the respective symposium through COCUS systems
at
http://cocus.create-net.it/cocus/wellcome.do. Authors of accepted
papers
are required to register at regular registration rates in order for the
paper to appear in the conference proceedings.
Organizing Committee
--------------------
TPC Chair:
Farooq Anjum, Telcordia Technologies, USA
(fanjum@telcordia.com)
Technical Program Committee: to be decided
Srdjan Capkun, Technical University of Denmark, Denmark.
Prathima Agrawal, Auburn University, USA.
Rajeev Shorey, National University of Singapore, Singapore.
(To be extended later.)
Publicity Chair:
Santosh Pandey, Auburn University, USA (pandesg@auburn.edu)
Web Site
--------
www.secwin.org