CALL FOR PAPERS

The First International Workshop on
Wireless Security and Privacy (WiSP'08)

June 20, 2008
Beijing, China

held in conjunction with

The 28th International Conference on 
Distributed Computing Systems (ICDCS'08)


Theme and scope:

Wireless networks have experienced an explosive growth during the last few years. Nowadays, there is a large variety of networks spanning from the well-known cellular networks to non-infrastructure wireless networks such as mobile ad hoc networks and sensor networks. The security issue is a central concern for achieving secured communication in these networks. This workshop aims to bring together researchers and practitioners from wireless and sensor networking, security, cryptography, and distributed computing communities, with the goals of promoting discussions and collaborations. We are interested in novel research on all aspects of security in wireless and sensor networks and tradeoff between security and performance such as QoS, dependability, scalability, etc.


Topics of interest:

We are seeking papers that describe original and unpublished contributions addressing various aspects of secured wireless/sensor networks. Topics of interest include, but are not limited to:

Authentication and Access Control
Cryptographic Protocol
Experimental Studies
Key Management
Information Hiding
Intrusion Detection and Response
Privacy and Anonymity
Secure Localization and Synchronization
Security and Performance tradeoff
Security Policy and Enforcement Issues
Security Protocols Design, Analysis and Verification
Secure Routing/MAC
Surveillance and Monitoring
Threat & Trust Management

Paper Submission:
 

Submit an electronic version of manuscripts, not exceed 6 pages (IEEE Computer Society proceedings Manuscripts: two columns, single-spaced) to zjiang@wcupa.edu, including an abstract, 3-5 key words, the corresponding authorís e-mail, figures, and references (http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html). Prepare your papers in PDF file only. Acknowledgement will be sent back for each submission within 24 hours; otherwise, a re-submission is needed.

Each submitted paper will be peer reviewed and the comments will be provided to the authors. Accepted papers will be published by IEEE Computer Society Press, as proceedings of the ICDCSí08 workshops.

Submit your final camera-ready version on line (under this link). When you are asked for the author e-mail, please find and use the one listed in our tentative program. Submission of a paper should be regarded as an undertaking that, should the paper be accepted, at least one of the authors will register and attend the workshop to present the work.


Special Issue:

We also plan to publish the full versions of the manuscripts as a special issue of International Journal of Security and Networks (IJSN) (http://www.inderscience.com/ijsn/). Selected authors will be invited to prepare articles after the workshop, with an additional review phase by the workshop committee and journal editors.


Important Dates:

Manuscript Submission:                        11/15/2007
Acceptance Notification:                        2/11/2008
Final Manuscript Due:                           3/23/2008
Workshop Date:                                   6/20/2008
Full Version Due:                                 7/25/2008


Workshop General Chair

Dr. Sajal Das
University Texas at Arlington, USA
das@cse.uta.edu 

Workshop Program Co-chairs

Dr. Zhen Jiang
West Chester University, USA
zjiang@wcupa.edu

Dr. Xiao Chen
Texas State University, USA
xc10@txstate.edu


Steering Committee member

Dr. Jie Wu
National Science Foundation & Florida Atlantic University, USA
 


Program Committee member

A. Agah, West Chester University, USA

R. Beyah, Georgia State University, USA

A. Bourgeois, Georgia State University, USA

S. Chen, Florida International University, USA

Z. Chen, Beijing University, China

B. Dragovic, Create-Net, Italy

Y. Guan, Iowa State University, USA

T. He, University of Minnesota, USA

D. Kundor, Texas A&M University, USA

M. Li, Shanghai Jiaotong University, China

Q. Li, College of William and Mary, USA

D. Liu, University of Texas, Arlington, USA

J. Liu, Wayne State University, USA

Y. Liu, Hong Kong University of Science and Technology, HK, China

W. Lou, Hong Kong Polytechnic University, HK, China

F. Kargl, Ulm University, Germany

S. Mishra, University of Colorado, USA

C. Nita-Rotaru, Purdue University, USA

G. Noubir, Northeastern University, USA

S. Olariu, Old Dominion University, USA

B. Preneel, Katholieke Universiteit Leuven, Belgium

D. Qiao, Iowa State University, USA

H. Shen, University of Arkansas, USA

H. Song, Frostburg State University, USA

A. Weimerskirch, Escrypt Inc. - Embedded Security, USA

N. Xiao, National University of Defense Technology, China

Y. Xia, University of Florida, USA

S. Yang, Rensselaer Polytechnic Institute, USA

W. Zhang, Iowa State University, USA