Call for Papers
Pervasive Communication Security, Social Networking and Social Engineering Workshop
In conjunction with The International Conference on Computing, Networking and Communications (ICNC 2012)
Maui, Hawaii, USA
January 30 - February 2, 2012
http://www.conf-icnc.org/
Contact Information
Narasimha Shashidhar, Sam Houston State University, Huntsville, TX, USA
karpoor@shsu.edu
Lei Chen, Sam Houston State University, Huntsville, TX, USA
chen@shsu.edu
Scope:
The future of communication relies on the ability of communication systems to blend into the user's environment with the goal of supporting social and collaborative communication and computation. To this end, providing confidentiality and integrity of communicated data are desired key security features in a pervasive communication system. Users need to be able to trust the communication systems and find out how trustworthy their peers are. As the communication and associated systems become more pervasive, these privacy issues are amplified. These security requirements result in many challenges in the research and development of pervasive systems. The aim of this workshop is to enable researches, scientists, and engineers in the community to exchange and share ideas and experience, and demonstrate latest research outcomes on all areas of security, trust and privacy in pervasive communication systems. This workshop solicits original work in various aspects of, but not limited to, the following topics:
--- Decentralized, scalable social networking
--- Privacy-aware, personally controlled social networking
--- Availability and resilience
--- Community based secure communication
--- Data confidentiality and integrity
--- Anonymity and Pseudonymity
--- New approaches to trust and reputation
--- New attack paradigms
--- Social engineering, Spam and Phishing
--- Context aware services and applications
--- Scalable and efficient authentication and key management solutions
--- Designing appropriate reputation systems for various situations
--- Utilizing communities to build trust
--- Managing privacy of personal information
Submission Guidelines
Please follow the author instructions at http://www.conf-icnc.org/author.htm
For submission: Workshop papers should be submitted via EDAS at the conference page:
http://edas.info/N10987. In addition, please send a pdf file of your paper to karpoor@shsu.edu
Important dates
Submission deadline AUG 21, 2011
Notification of acceptance Sept. 30, 2011
Submission of camera-ready version and Registration Oct. 20, 2011
**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************