The Fourth International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2014)

in conjunction with ICCCN 2014

Shanghai, China

August 7, 2014,Deadline extended to April 6, 2014 (FIRM)

Submit paper at https://www.easychair.org/conferences/?conf=mobipst2014

Call for Paper[PDF, WORD]

mobipst2014

 [General Info] [Scope and Topics] [Important Dates] [Submissions and Publications] [Organizing Committees] [Technical Program] [Traval Information][Contact]  


General Information

The Fourth International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2014) will be held in conjunction with the 23th International Conference on Computer Communications and Networks (ICCCN 2014), in Shanghai, China. All papers presented in MobiPST 2014 will be published in the workshop proceedings.

Outstanding papers will be invited to extend to full version for a SCI(E)-indexed journal, which is currently under contact.

Scope and Topics

Recently, mobile wireless devices, such as wireless sensors, smart tags, smart pads, tablets, PDAs and smart phones, have become pervasive and attracted significant interest from academia, industry, and standard organizations. With the latest cloud computing technology, those mobile wireless devices will play a more and more important role in computing and communication. When those devices become pervasive, security, privacy and trust become critical components for the acceptance of applications build based on those devices. Moreover, several favorable characteristics of mobile and wireless devices, including portability, mobility, and sensitivity, further impose the challenge of security and privacy in those systems. Despite recent advances, many research issues still remain in the design of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. For example, when mobile devices have more storage space, high bandwidth, and super sensing capability, more sensitive information will be stored in those devices. On the other hand, operating systems running on those devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of those devices. With more mobile devices being used in social networks and traditional web-based systems, novel trust models are essential for new applications. New cryptographic algorithms, key distribution schemes and access control policies are also encouraged by considering the special characteristics of mobile and wireless devices. Other issues such as malware, cyber threat, intrusion detection, attack modeling, security analysis, identity management and anonymity techniques also need to be revisited in mobile and wireless systems.

This workshop aims to bring together the technologists and researchers who share interest in the area of security, privacy and trust in mobile and wireless systems, as well as explore new venues of collaboration. The main purpose is to promote discussions of research and relevant activities in the models and designs of secure, privacy-preserving, or trust architectures, protocols, algorithms, services, and applications, as well as analysis on cyber threat in mobile and wireless systems. It also aims at increasing the synergy between academic and industry professionals working in this area. We plan to seek papers that address theoretical, experimental research, and work in-progress for security, privacy and trust related issues in the context of mobile and wireless systems that include, but are not limited to, the following

 

 

Important Dates

 

Paper submission due:  March 14, 2014 Extended to April 6, 2014(FIRM)

Acceptance notification:  May 2, 2014

Camera-ready due:  May 12, 2014

Workshop: August 7, 2014

 

Submissions and Publications

 

Authors are invited to submit manuscripts reporting original unpublished research and recent developments in the topics related to the workshop. Submissions should include a title, abstract, keywords, author(s) and affiliation(s) with postal and e-mail address(es) of the corresponding author. Submitted manuscripts must be formatted in standard IEEE camera-ready format (double-column, 10-pt font) and must be submitted via EasyChair (http://www.easychair.org/) as PDF files (formatted for 8.5x11-inch paper). The manuscripts should be no longer than 5 pages. One additional page is permitted if the authors are willing to pay an over-length charge at the time of publication (manuscripts should not exceed 6 pages). Submitted papers cannot have been previously published in or be under consideration for publication in another journal or conference. The workshop Program Committee reserves the right to not review papers that either exceed the length specification or have been submitted or published elsewhere. Submissions must include a title, abstract, keywords, author(s) and affiliation(s) with postal and e-mail address(es). All authors of a paper must be registered in the RIGHT order via EasyChair at the SUBMISSION TIME and cannot be changed after the submission due time at EasyChair. The paper title and author name list/order cannot be changed during the final camera-ready submission.

 

Submitted papers will be reviewed by the workshop Program Committee and judged on originality, technical correctness, relevance, and quality of presentation and the comments will be provided to the authors. Workshop papers will be in the same proceedings of the main conference papers. An accepted paper must be presented at the ICCCN 2014 venue by one of the authors registered at the full registration rate. If any accepted paper is not registered, the paper will be removed from the workshop program and the proceedings. Each workshop registration covers up to two workshop papers by an author. Accepted and registered papers will be published in proceedings that will be available through Xplore. Papers that are not presented at the ICCCN 2014 venue by one of the registered co-authors will not appear in Xplore.

Outstanding papers will be invited to extend to full version for a prestigious journal, Journal of Security and Network targeting publication in early 2014.

When uploading a camera-ready at IEEE, note that the paper title, author names/affiliation and order must be IDENTICAL to the original submission for peer reviewing. No title change, author addition or removal is allowed.

 

A paper must be registered by a co-author in the full rate. It must be presented by one of registered authors in the venue.

 

Camera-ready and registration due date May 12, 2014 is FIRM. Check ICCCN homepage to find detailed instructions. Please try to complete the process as early as possible in order to avoid the rush hour, giving you time to deal with unexpected but possible issues/delay.

                   

Technical Program

 

Keynote Address:

Dr. Pramode Verma (Professor and Director of the Telecommunications Engineering Program, the University of Oklahoma-Tulsa)

Pramode Verma is Professor and Director of the Telecommunications Engineering Program in the School of Electrical and Computer Engineering of the University of Oklahoma-Tulsa. He also holds the Williams Chair in Telecommunications Networking. Prior to joining the University of Oklahoma in 1999 as the founder-director of a graduate program in Telecommunications Engineering, Dr. Verma held a variety of professional, managerial and leadership positions in the telecommunications industry at AT&T Bell Laboratories and Lucent Technologies. He is the author/co-author of over 150 journal articles and conference papers, and several books in telecommunications engineering. He is also the co-inventor of eight patents with several patents pending. He regularly serves on NSF panels and has been an External Examiner for Ph.D. theses at the University of Cape Town, South Africa, University of Ottawa, and Carleton University, Ottawa. He has been a keynote speaker at several international conferences and has lectured in several countries. He received the University of Oklahoma-Tulsa Presidents Leadership Award for Excellence in Research and Development in 2009. He is a Senior Member of the IEEE and a Senior Fellow of The Information and Telecommunication Education and Research Association. He obtained his Ph.D. in 1970 from the Concordia University in Montreal, Canada, and an MBA from the Wharton School, University of Pennsylvania in 1984.

 

Abstract: Unconditional security of information while in transit is an imperative of contemporary society. Quantum communication will bring about not only communication in the form as we know it, but also ensure that it is unconditionally secure as it transits through free space or an optical fiber. Given that information is the currency of a modern society, its security is paramount for the wellbeing of an individual, a society, a nation, or the globe as a whole. The talk will discuss the short history of quantum communication especially in the multi-photon domain and draw upon the theoretical and experimental work that the author and his colleagues have conducted over the past few years in order to chart out the likely course of future events in secure communication.

 

Organizing Committees

 

Workshop Program Co-Chairs

Kewei Sha, Oklahoma City University, USA

Abhishek Parakh, University of Nebraska at Omaha, USA

 

Technical Program Committee

          Alfred Weaver, University of Virginia, USA

          Sherali Zeadally, University of Kentucky, USA

          William Mahoney, University of Nebraska, Omaha, USA

          Robin Gandhi, University of Nebraska, Omaha, USA

          Subhash Kak, Oklahoma State University, USA

          Pramode Verma, University of Oklahoma, USA

          Guo Song, The University of Aizu, Japan

          Danfeng (Daphne) Yao, Virginia Tech, USA

          Mauro Conti, University of Padua, Italy

          Weichao Wang, University of North Carolina at Charlotte, USA

          Claudio Agostino Ardagna, University of Milan, Italy

          Christoph Meinel, Hasso-Plattner Institute, Germany

        James Joshi , University of Pittsburgh, USA

          Keke Chen, Wright State University, USA

          Songqing Chen, George Mason University, USA

          Gul Khan, Ryerson University, Canada

          Yafei Yang, Qualcomm Inc., USA

          Peng Zhang, Xian University of Posts and Telecommunications, China

          Jiqiang Lu, Institute for Infocomm Research, Singapore

          Dongwan Shin, New Mexico Tech, USA

          Byrav Ramamurthy, University of Nebraska, Lincoln, USA

          Todd Andel, University of South Alabama, USA

          Lukas Kencl, Czech Tech. Univ. in Prague, Czech Republic

          Angelo Coluccia, University of Salento, Italy

          Julinda Stefa, Sapienza University of Rome, Italy

          Zhiwei Wang, Nanjing University of Posts and Telecommunications, China

Travel Information

 

 

 

Contact Information

 

Kewei Sha, Oklahoma City University, USA

Abhishek Parakh, University of Nebraska at Omaha, USA