International Workshop on Security and Privacy
in Wireless and Mobile Computing, Networking and Communications

SecPri_WiMob 2008

October 12, 2008, Avignon, France  

Importants Dates

Submission Deadline: June 30, 2008
Acceptance Notification: July 23, 2008
Camera-ready: August 10, 2008
Registration & payment: August 20, 2008
Workshop Date:October 12, 2008

Aims & Scope

Wireless and Mobile communication networks offer organizations and users several benefits, such as portability, mobility and flexibility, while increasing everyday business productivity, and reducing installation cost. Wireless Local Area Networks, for instance, have been used in various environments, such as business, home, conference centers, airports and many more, allowing users to move from place to place, avoiding cabling restrictions and without being disconnected from the network. Ad Hoc Networks are collections of wireless computers communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points; these networks allow data synchronization with network systems and application sharing between devices. Mobile Ad Hoc Networks are autonomous collection of mobile entities that communicate over relatively bandwidth constrained wireless links, establishing survivable, efficient, dynamic communication for emergency operations. Wireless Ad Hoc Sensor Networks consist of a number of sensors spread across a geographical area, offering certain capabilities and enhancements in operational efficiency in civilian applications, as well as assisting in international effort to increase alertness to potential threats. However, although Wireless and Mobile communication environments eliminate many of the problems associated with traditional wired networks, the new security and privacy risks introduced by such environments need to be reduced by exploiting appropriate security measures and safeguards, ensuring an acceptable level of overall residual hazard. The objectives of the SecPri_WiMob 2008 Workshop are to bring together researchers from research communities in Wireless and Mobile Computing, Networking and Communications, Security and Privacy, with the goal of fostering interaction.

List of Topics

We welcome the submission of papers from the full spectrum of issues related with Security and Privacy in Wireless and Mobile Computing, Networking and Communications. Papers may focus on protocols, architectures, methods, technologies, applications, practical experiences, simulation results and analysis, theory and validation on topics include, but not limited to:
Cryptographic Protocols for Mobile and Wireless Networks Key Management in Mobile and Wireless Computing
Reasoning about Security and Privacy Privacy and Anonymity in Mobile and Wireless Computing
Public Key Infrastructure in Mobile and Wireless Environments Economics of Security and Privacy in Wireless and Mobile environments
Security Architectures and Protocols in Wireless LANs Security Architectures and Protocols in B3G/4G Mobile Networks
Security and Privacy features into Mobile and Wearable devices Location Privacy
Ad hoc Networks Security Sensor Networks Security
Wireless Ad Hoc Networks Security Role of Sensors to Enable Security
Security and Privacy in Pervasive Computing Trust Establishment, Negotiation, and Management
Secure PHY/MAC/routing protocols Security under Resource Constraints (bandwidth, computation constraints, energy)


©2008, Last Update 26/2/2008