International Workshop on Security and Privacy
in Wireless and Mobile Computing, Networking and Communications

SecPri_WiMob 2008

October 12, 2008, Avignon, France  

Importants Dates

Submission Deadline: June 30, 2008
Acceptance Notification: July 23, 2008
Camera-ready: August 10, 2008
Registration & payment: August 20, 2008
Workshop Date:October 12, 2008


Find Workshop's program in PDF format here




09.00 – 10.00: Privacy in Mobile and Wireless Computing (I)

Strengthening Privacy Protection in VANETs,
Mike Burmester, Emmanouil Magkos, Vassilios Chrissikopoulos

Random Beacon for Privacy and Group Security,
Aleksi Saarela, Jan-Erik Ekberg, Kaisa Nyberg

10.30 – 12.30: Key Management in Mobile and Wireless Computing

An efficient scheme for key-predistribution in wireless sensor networks
Manel Boujelben, Habib Youssef, Mohamed Abid

Analysis of Key Distribution in Mobile Ad Hoc Networks based on Message Relaying
Hisham Dahshan, James Irvine

A Password-based Key Establishment Protocol with Symmetric Key Cryptography,
Imran Erguler

Key Management and Secure Routing in Heterogeneous Sensor Networks
Firdous Kausar

14.30 – 15.30: Cryptographic Protocols for Mobile and Wireless Environments (I)

Securing Dynamic Home Agent Address Discovery with Cryptographically Generated Addresses and RSA Signatures
Christian Bauer, Max Ehammer

Security and Access Control for Vehicular Communications
Saber Zrelli

16.15 – 17.15: Cryptographic Protocols for Mobile and Wireless Environments (II)

RF Fingerprints for Secure Authentication in Single-Hop WSN
David Knox Thomas Kunz

A Protocol For Pervasive Distributed Computing Reliability
Alberto Ferrante, Roberto Pompei, Anastasia Stulova, Antonio Taddeo


09.00 – 10.00: Privacy in Mobile and Wireless Computing (II)

Preventing Profile Generation in Vehicular Networks
Klaus Ploessl, Florian Scheuer, Hannes Federrath

Launching a Sinkhole Attack in Wireless Sensor Networks; the Intruder Side
Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou

10.30 – 12.30: Sensor Networks Security

On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
Giacomo de Meulenaer

An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
Christoph Krauß, Markus Schneider, Claudia Eckert

Functional Reputation Based Data Aggregation for Wireless Sensor Networks,
Suat Ozdemir

QDV: A Quality-Based Distance Vector Routing for Wireless Sensor Networks Using Ant Colony Optimization
Sanjay Dhurandher, Sudip Misra, Mohammad S. Obaidat, Nidhi Gupta

14.30 – 15.30: Wireless Ad-hoc Networks Security (I)

Intrusion Detection in Wireless Sensor Networks: The S-Model Learning Automata Approach
Sudip Misra, Kiran Abraham, Mohammad S. Obaidat, Venkata Krishna

A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
Hadi Otrok

16.15 – 17.15: Wireless Ad-hoc Networks Security (II)

Authentication in a multi-access IMS environment
Ivar Jørstad, Do Van Thanh, Paal Engelstad, Tore Jønvik, Boning Feng, van Thuan Do

Using context information to improve computation of trust in ad hoc networks
Chung Tien Nguyen, Olivier Camp

©2008, Last Update 26/2/2008