(mobo import Concept___Event_For_Confident-migrated_2) |
Curator 91 (talk | contribs) |
||
(9 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
{{Event | {{Event | ||
− | |Acronym= | + | |Acronym=WiSec 2009 |
− | |Title= | + | |Title=ACM Conference on Wireless Network Security |
+ | |Ordinal=2 | ||
+ | |In Event Series=Event Series:8d83e7bf-dc36-4324-ab27-c036ec49ce2f | ||
+ | |Single Day Event=no | ||
+ | |Start Date=2009/03/16 | ||
+ | |End Date=2009/03/18 | ||
+ | |Event Status=as scheduled | ||
+ | |Event Mode=on site | ||
+ | |City=Zürich | ||
+ | |Country=Country:CH | ||
+ | |Academic Field=Computer Reliability; Computer Security; Network Security | ||
+ | |Official Website=http://www.sigsac.org/wisec/WiSec2009 | ||
|Type=Conference | |Type=Conference | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
|wikicfpId=3231 | |wikicfpId=3231 | ||
|pageCreator=127.0.0.1 | |pageCreator=127.0.0.1 | ||
|contributionType=1 | |contributionType=1 | ||
− | |||
− | |||
− | |||
}} | }} | ||
− | + | {{Event Deadline | |
+ | |Notification Deadline=2008/12/10 | ||
+ | |Paper Deadline=2008/10/01 | ||
+ | |Camera-Ready Deadline=2009/01/12 | ||
+ | }} | ||
+ | {{Organizer | ||
+ | |Contributor Type=organization | ||
+ | |Organization=Special Interest Group on Security, Audit and Control, Association for Computing Machinery | ||
+ | }} | ||
+ | {{Event Metric}} | ||
+ | {{S Event}} | ||
<pre> | <pre> | ||
As wireless networks become ubiquitous, their security gains in importance. The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless networks as well as techniques to thwart them. The considered networks encompass cellular, metropolitan, local area, vehicular, ad hoc, satellite, underwater, cognitive radio, and sensor networks as well as RFID. | As wireless networks become ubiquitous, their security gains in importance. The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless networks as well as techniques to thwart them. The considered networks encompass cellular, metropolitan, local area, vehicular, ad hoc, satellite, underwater, cognitive radio, and sensor networks as well as RFID. | ||
Line 32: | Line 44: | ||
* Anonymity, prevention of traffic analysis | * Anonymity, prevention of traffic analysis | ||
* Identity theft and phishing in mobile networks | * Identity theft and phishing in mobile networks | ||
− | * | + | * Charging |
* Cooperation and prevention of non-cooperative behavior | * Cooperation and prevention of non-cooperative behavior | ||
* Economics of wireless security | * Economics of wireless security | ||
Line 52: | Line 64: | ||
* Camera-ready version: January 15, 2009 | * Camera-ready version: January 15, 2009 | ||
* Conference: March 16 - 18, 2009 | * Conference: March 16 - 18, 2009 | ||
− | </pre>This CfP was obtained from [http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=3231&copyownerid=2 WikiCFP][[Category:Mobile computing]] | + | </pre>This CfP was obtained from [http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=3231&copyownerid=2 WikiCFP] |
+ | [[Category:Mobile computing]] |
Latest revision as of 11:44, 15 December 2022
Deadlines
|
||
Paper |
|
||
Notification |
|
||
Camera-Ready |
Metrics
Venue
Zürich, Switzerland
Warning: Venue is missing. The map might not show the exact location.
As wireless networks become ubiquitous, their security gains in importance. The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless networks as well as techniques to thwart them. The considered networks encompass cellular, metropolitan, local area, vehicular, ad hoc, satellite, underwater, cognitive radio, and sensor networks as well as RFID. Topics of interest include, but are not limited to: * Naming and addressing vulnerabilities * Key management in wireless/mobile environments * Secure neighbor discovery / Secure localization * Secure PHY and MAC protocols * Trust establishment * Intrusion detection, detection of malicious behavior * Revocation of malicious parties * Denial of service * User privacy, location privacy * Anonymity, prevention of traffic analysis * Identity theft and phishing in mobile networks * Charging * Cooperation and prevention of non-cooperative behavior * Economics of wireless security * Vulnerability and attack modeling * Incentive-aware secure protocol design * Jamming/Anti-jamming communication * Cross-layer design for security * Monitoring and surveillance * Cryptographic primitives for wireless communication * Formal methods for wireless security * Mobile platform and systems (OS and application) security ACM WiSec results from the merger of three workshops: ESAS (European Workshop on the Security of Ad Hoc and Sensor Networks), SASN (ACM Workshop on the Security of Ad Hoc and Sensor Networks) and WiSe (ACM Workshop on Wireless Security). The proceedings will be published by the ACM. Important Dates * Paper submission: September 22, 2008 * Notification of acceptance: December 10, 2008 * Camera-ready version: January 15, 2009 * Conference: March 16 - 18, 2009
This CfP was obtained from WikiCFP