Call for Papers - Third International Symposium on Mobile and Wireless Network Security (MWNS-12)

Banner: General computing

Important dates

  • Submission Deadline: 6 April 2012
  • Authors Notification: 20 April 2012
  • Final Manuscript Due: 8 May 2012
  • Registration Due: 8 May 2012.

In conjunction with 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12).

Venue & Dates: Liverpool, UK, 25 - 27 June 2012.

Introduction

Mobile and wireless networks are regarded as the key underlying infrastructures for realizing the next generation networking and computing, such as cloud computing, ubiquitous computing, and 4G networks. Compared to wired networks, mobile and wireless networks are more vulnerable to different attacks such as denial of service, man in the middle, hijacking, spoofing, etc. In addition, mobile and wireless networks usually have limited resources, which is a real problem in security solution design. These unique characteristics of the mobile and wireless networks pose a number of challenges in terms of security. We need to design secure and robust solutions which are light enough to be supported by mobile terminals and communications. Addressing these challenging issues can provide better secure services and increase the overall system performance. This symposium aims to identify and explore different issues and challenges related to security aspects in mobile and wireless networks. For example, what are the benefits or inconvenience of mobility on security? What are the appropriate mobility models to have a good level of security? Are classical IDS approaches appropriate for mobile environments? How can we build up trusted platforms and trustworthy systems for mobile and wireless networks?

This symposium will be held in conjunction with the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), an ideal vehicle for bringing together researchers, scientists, engineers, academics and students all around the world to share the latest updates on new security technologies that would shape the next generation of mobile and wireless systems and technology platforms.

Scope and Interests

We are interested in the following topics, but are not limited to:

  • Mobile and wireless networks
  • Trustworthiness and dependability
  • Security, privacy, risk management
  • Cloud and virtual computing
  • Service oriented and P2P computing
  • Wireless sensor networking
  • Internet-based virtual computing environment
  • Performance and security trade-offs.

Submission and Publication Information

The accepted papers from this symposium will be published by IEEE Computer Society in  IEEE TrustCom-12 conference/symposium proceedings (indexed by EI Compendex). Papers should be written in English conforming to the IEEE conference proceedings format (8.5" x 11", Two-Column). Papers should be submitted through the paper submission system at the conference website. Each paper is limited to 6 pages (or 8 pages with the over length charge). Distinguished papers, after further revisions, will be published in the special issues: International Journal of Sensor Networks (indexed by SCI).

Submission will be handled through EasyChair. Please find the submission link:

Important dates

  • Submission Deadline: 6 April 2012
  • Authors Notification: 20 April 2012
  • Final Manuscript Due: 8 May 2012
  • Registration Due: 8 May 2012.

General Co-Chairs

  • Nick Antonopoulos, University of Derby, UK
  • Jie Xu, University of Leeds, Leeds, UK.

Program Co-Chairs

  • Lei Shu, Osaka University, Japan
  • Lu Liu, University of Derby, UK
  • Jianxin Li, Beihang University, China.

Program Committee (In alphabetical order)

To be announced.

Publicity Co-Chairs

  • Jams Hardy, University of Derby, UK
  • Hussain Al-Aqrabi, University of Derby, UK.

Contact

Please email inquiries concerning MWNS 2012 to:

Or

Use of personal data

Our policy is to only use the data you supply to us for use in regard to the work of the University of Derby. We do not pass on your data to any other third party under any circumstances.

© Copyright University of Derby 2013 | Accessibility | Privacy and cookies | Site map | Disclaimer | Freedom of Information | Company info | About us as a charity | Trademarks of the University of Derby | Staff admin