Forwarded from: Wenyuan Xu <wyxu (at) cse.sc.edu. ---------------------------------------------------------------------------- ----- The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks ACM WiSec '13 April 17-19, 2013 Budapest, Hungary ---------------------------------------------------------------------------- ----- *** CALL FOR PAPERS *** IMPORTANT DATES Submission Deadline: Oct 29, 2012 Notification Date: Jan 20, 2013 Camera-Ready Deadline: Feb 15, 2013 BROADENED SCOPE WiSec has been broadening its scope and seeks to present high quality research papers exploring security and privacy aspects of wireless communications, mobile networks, and their applications. Beyond the traditional Wisec staples of physical, link, and network layer security, we also welcome papers focusing on the security and privacy of mobile software platforms and the increasingly diverse range of mobile or wireless applications. The conference welcomes both theoretical as well as systems contributions. Topics of interest include, but are not limited to: * Mobile malware and platform security * Security & Privacy for Smart Devices (e.g., Smartphones) * Wireless and mobile privacy and anonymity * Secure localization and location privacy * Cellular network fraud and security * Jamming attacks and defenses * Key extraction, agreement, or distribution in wireless and mobile settings * Theoretical foundations, cryptographic primitives, and formal methods for wireless security and privacy * NFC and smart payment applications * Security and privacy for mobile sensing systems * Wireless or mobile security and privacy in health, automotive, avionics, or smart grid applications The proceedings of ACM WiSec will be published by the ACM. FULL AND SHORT PAPERS: Full paper submissions to WiSec 2013 can be up to 10 pages in the ACM conference style excluding the bibliography and well marked appendices, and up to 12 pages in total. WiSec also encourages the submission of short papers with a length of up to 6 pages, which describe mature work of a more succinct nature. All papers must be thoroughly anonymized for double-blind reviewing. Detailed submission instructions will appear on the conference website (http://www.sigsac.org/wisec/WiSec2013/SubInstructions.php). DOUBLE SUBMISSIONS: It is a policy of the ACM (http://www.acm.org/publications/policies/RightsResponsibilities) to disallow double submissions, where the same (or substantially similar) paper is concurrently submitted to multiple conferences/journals. Any double submissions detected will be immediately rejected from all conferences/journals involved. ORGANIZERS General Chair Levente Buttyan, Budapest University of Technology and Economics, Hungary Technical Program Chairs Ahmad-Reza Sadeghi, Technische Universitat Darmstadt, Germany Marco Gruteser, Rutgers University, USA Publicity Chairs Wenyuan Xu, University of South Carolina, USA Panos Papadimitratos, Kungliga Tekniska Hogskolan, Sweden Publication Chair Loukas Lazos, University of Arizona, USA Poster/Demo Chair Matthew Smith, Leibniz Universitat Hannover, Germany Web Chair Mark Felegyhazi, Budapest Univeristy of Technology and Economics, Hungary Steering committee - N. Asokan, NRC, Finland - Levente Buttyan, BME, Hungary - Claude Castelluccia, INRIA, France - Jean-Pierre Hubaux, EPFL, Switzerland - Douglas Maughan, DHS, USA - Adrian Perrig, CMU, USA - Gene Tsudik, UCI, USA (chair) - Dirk Westhoff, HAW, Germany Program Committee - N. Asokan, Nokia Research Center - Giuseppe Ateniese, Johns Hopkins University - Levente Buttyan, Budapest University of Technology and Economics - Srdjan Capkun, ETH Zurich - Claude Castelluccia, INRIA Rhone-Alpes - Yingying Chen, Stevens Institute of Technology - Mauro Conti, Vrije Universiteit Amsterdam - Emiliano De Cristofaro, Palo Alto Research Center - Roberto Di Pietro, Universita di Roma Tre - William Enck, North Carolina State University - Sebastian Gajek, NEC - Albert Held, Daimler - Urs Hengartner, University of Waterloo - Yih-Chun Hu, University of Illinois at Urbana-Champaign - Javier Lopez, University of Malaga - Wenjing Lou, Virginia Polytechnic Institute and State University - Frank Kargl, University of Twente - Kari Kostiainen, Nokia Research Center - Patrick Koeberl, Intel Corporation - Stefan Mangard, Infineon - Ivan Martinovic, University of Oxford - Heike Neumann, NXP - Cristina Nita-Rotaru, Purdue University - Guevara Noubir, Northeastern University - Radha Poovendran, University of Washington - Kasper Bonne Rasmussen, University of California, Irvine - Pankaj Rohatgi, Cryptographic Research Incorporation - Elaine Shi, University of Maryland - Jamshid Shokrollahi, Robert Bosch GmbH - Michael Steiner, IBM Research - Wade Trappe, WINLAB, Rutgers University - Patrick Traynor, Georgia Tech - Ersin Uzun, PARC - Sean Wang, Fudan University - Wenyuan Xu, University of South Carolina - Sencun Zhu, Penn State University -- CISSP and CEH Live OnLine training with ExpandingSecurity.com is the fastest, easiest way to master the relevant data you need now. Sign up for the free weekly PainPill and try a free class. It is easy. http://www.expandingsecurity.com/PainPillReceived on Mon Oct 15 2012 - 03:42:33 PDT
This archive was generated by hypermail 2.2.0 : Mon Oct 15 2012 - 03:37:43 PDT