Difference between revisions of "WISEC 2009"

From OPENRESEARCH fixed Wiki
Jump to navigation Jump to search
(modified through wikirestore by Th)
 
(modified through wikirestore by orapi)
Line 1: Line 1:
 
{{Event
 
{{Event
 +
| Acronym = WISEC 2009
 +
| Title = Second ACM Conference on Wireless Network Security
 +
| Type = Conference
 +
| Series =
 
  | Field = Computer security and reliability
 
  | Field = Computer security and reliability
 +
| Homepage = www.sigsac.org/wisec/WiSec2009
 +
| Start date = Mar 16, 2009
 +
| End date =  Mar 18, 2009
 +
| City= Zurich
 +
| State =
 +
| Country =  Switzerland
 
  | Abstract deadline =  
 
  | Abstract deadline =  
 
  | Submission deadline = Sep 22, 2008
 
  | Submission deadline = Sep 22, 2008
 
  | Notification = Dec 10, 2008
 
  | Notification = Dec 10, 2008
  | Camera ready =
+
  | Camera ready =  
| Acronym= WISEC 2009
+
|wikicfpId=3231}}
| End date= 2009/03/18
 
| Series=
 
| Type  = Conference
 
| Country= US
 
| State = US/KS
 
| City  = US/KS/Zurich
 
| Homepage= www.sigsac.org/wisec/WiSec2009
 
| Start date= 2009/03/16
 
| Title = Second ACM Conference on Wireless Network Security
 
| wikicfpId= 3231}}
 
  
 
<pre>
 
<pre>

Revision as of 16:33, 3 November 2021


Event Rating

median worst
Pain3.svg Pain7.svg

List of all ratings can be found at WISEC 2009/rating

WISEC 2009
Second ACM Conference on Wireless Network Security
Dates Mar 16, 2009 (iCal) - Mar 18, 2009
Homepage: www.sigsac.org/wisec/WiSec2009
Location
Location: Zurich, Switzerland
Loading map...

Important dates
Submissions: Sep 22, 2008
Notification: Dec 10, 2008
Table of Contents


As wireless networks become ubiquitous, their security gains in importance. The ACM Conference on Wireless Network Security (WiSec) aims at exploring attacks on wireless networks as well as techniques to thwart them. The considered networks encompass cellular, metropolitan, local area, vehicular, ad hoc, satellite, underwater, cognitive radio, and sensor networks as well as RFID.
Topics of interest include, but are not limited to:

    * Naming and addressing vulnerabilities
    * Key management in wireless/mobile environments
    * Secure neighbor discovery / Secure localization
    * Secure PHY and MAC protocols
    * Trust establishment
    * Intrusion detection, detection of malicious behavior
    * Revocation of malicious parties
    * Denial of service
    * User privacy, location privacy
    * Anonymity, prevention of traffic analysis
    * Identity theft and phishing in mobile networks
    * Charging
    * Cooperation and prevention of non-cooperative behavior
    * Economics of wireless security
    * Vulnerability and attack modeling
    * Incentive-aware secure protocol design
    * Jamming/Anti-jamming communication
    * Cross-layer design for security
    * Monitoring and surveillance
    * Cryptographic primitives for wireless communication
    * Formal methods for wireless security
    * Mobile platform and systems (OS and application) security

ACM WiSec results from the merger of three workshops: ESAS (European Workshop on the Security of Ad Hoc and Sensor Networks), SASN (ACM Workshop on the Security of Ad Hoc and Sensor Networks) and WiSe (ACM Workshop on Wireless Security). The proceedings will be published by the ACM.

Important Dates

    * Paper submission: September 22, 2008
    * Notification of acceptance: December 10, 2008
    * Camera-ready version: January 15, 2009
    * Conference: March 16 - 18, 2009
	

This CfP was obtained from WikiCFP