Tag: mobile

Aug 14

ACCESS 2013 : The International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security 2013

 

ACCESS 2013 : The International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security 2013

Link: http://www.accesscongress.org
When Jun 5, 2013 – Jun 7, 2013
Where Singapore
Submission Deadline Oct 15, 2012
Notification Due Nov 19, 2012
Final Version Due Jan 7, 2013
Categories    research   informatics   environment   security

Call For Papers

The ACCESS Congress 2013 seeks for original research papers in the following areas, but are not limited to the domains listed below. The submission topics are divided into 4 domains:

(A) Human Safety & Security

Ageing
Stroke
Healthcare & Wellness
Pandemic Management
Infectious Diseases
Low Fertility
Human Performance

(B) Environment Safety &Security

Energy Sustainability
Food & Water
Climate Change
Building Infrastructures
Biodiversity
Disaster Management

(C) Information Safety & Security

Cloud Security
Social Media
Mobile Security
Electronic Crimes
Online Child Pornography

(D) Homeland Safety & Security

Sensors Systems
Microsystem Technologies
Geo-spatial
Transport & Logistics
Analytics & Intelligence
Immigrants and Social Issues

ACCESS 2013 : The International Congress on Advances in Citizen, Cyberspace & Environment Safety and Security 2013.

Aug 14

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks

 

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks

Link: http://www.crysys.hu/recent-news/229-wisec-2013.html
When Apr 17, 2013 – Apr 19, 2013
Where Budapest, Hungary
Submission Deadline Oct 29, 2012
Notification Due Jan 20, 2013
Final Version Due Feb 15, 2013
Categories    wireless   security   communications   networks

Call For Papers

* ACM approval pending

*** PRELIMINARY CALL FOR PAPERS ***

IMPORTANT DATES

Submission Deadline: Oct 29
Notification Date: Jan 20
Camera-Ready Deadline: Feb 15

BROADENED SCOPE

WiSec has been broadening its scope and seeks to present high quality
research papers exploring security and privacy aspects of wireless
communications, mobile networks, and their applications. Beyond the
traditional Wisec staples of physical, link, and network layer security, we
also welcome papers focusing on the security and privacy of mobile software
platforms and the increasingly diverse range of mobile or wireless
applications. The conference welcomes both theoretical as well as systems
contributions.

Topics of interest include, but are not limited to:
* Mobile malware and platform security
* Security & Privacy for Smart Devices (e.g., Smartphones)
* Wireless and mobile privacy and anonymity
* Secure localization and location privacy
* Cellular network fraud and security
* Jamming attacks and defenses
* Key extraction, agreement, or distribution in wireless and mobile
settings
* Theoretical foundations, cryptographic primitives, and formal
methods for wireless security and privacy
* NFC and smart payment applications
* Security and privacy for mobile sensing systems
* Wireless or mobile security and privacy in health, automotive,
avionics, or smart grid applications

The proceedings of ACM WiSec will be published by the ACM (pending
approval).

FULL AND SHORT PAPERS: Full paper submissions to WiSec 2013 can be up to 10
pages in the ACM conference style excluding the bibliography and well marked
appendices, and up to 12 pages in total. WiSec also encourages the
submission of short papers with a length of up to 6 pages, which describe
mature work of a more succinct nature. All papers must be thoroughly
anonymized for double-blind reviewing. Detailed submission instructions
will appear on the conference website
(http://www.sigsac.org/wisec/WiSec2013/SubInstructions.php).

DOUBLE SUBMISSIONS: It is a policy of the ACM
(http://www.acm.org/publications/policies/RightsResponsibilities) to
disallow double submissions, where the same (or substantially similar)
paper is concurrently submitted to multiple conferences/journals. Any
double submissions detected will be immediately rejected from all
conferences/journals involved.

ORGANIZERS

General Chair
Levente Buttyan, Budapest University of Technology and Economics, Hungary

Technical Program Chairs
Ahmad-Reza Sadeghi, Technische Universität Darmstadt, Germany
Marco Gruteser, Rutgers University, USA

Steering committee
N. Asokan, NRC, Finland
Levente Buttyan, BME, Hungary
Claude Castelluccia, INRIA, France
Jean-Pierre Hubaux, EPFL, Switzerland
Douglas Maughan, DHS, USA
Adrian Perrig, CMU, USA
Gene Tsudik, UCI, USA (chair)
Dirk Westhoff, HAW, Germany

WiSec 2013 : The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks.

Aug 14

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security

 

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security

Link: http://hise.hznu.edu.cn/asiaccs/
When May 8, 2013 – May 10, 2013
Where Hangzhou, China
Submission Deadline Nov 30, 2012
Categories    security

Call For Papers

Building on the success of ACM Conference on Computer and Communications Security (CCS) and ACM Transactions on Information and System Security (TISSEC), the ACM Special Interest Group on Security, Audit, and Control (SIGSAC) formally established the annual ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS). The inaugural ASIACCS was held in Taipei (2006). Since then the ASIACCS have been held in Singapore (2007), Tokyo (2008), Sydney (2009), Beijing (2010), Hong Kong (2011), and Seoul (2012). ASIACCS 2013 is the eighth conference of the series.

ASIACCS is a major international forum for information security researchers, practitioners, developers, and users to explore and exchange the newest cyber security ideas, breakthroughs, findings, techniques, tools, and experiences. We invite submissions from academia, government, and industry presenting novel research on all theoretical and practical aspects of computer and network security. Areas of interest for ASIACCS 2012 include, but are not limited to:

access control

identity management

privacy-enhancing technology

accounting and audit

Inference control and disclosure

security in ubiquitous computing

applied cryptography

information warfare

security management

authentication

intellectual-property protection

smartcards

cloud computing security

intrusion detection

software security

data/system integrity

key management

trusted computing

data and application security

malware and botnets

wireless security

digital-rights management

mobile-computing security

web security

formal methods for security

operating system security

hardware-based security

phishing and countermeasures

Important Dates

Submission Deadline: 30 November 2012, 23:59 UTC (Firm Deadline)
Acceptance Notification: 29 January 2013
Camera-ready Copy Due: 18 February 2013
Conference: 8-10 May 2013

Instructions for authors Submissions must be written in English, and must be at most 10 pages in 10pt, double-column format excluding the bibliography and well-marked appendices, and at most 12 pages overall. Committee members are not required to read appendices, so the paper should be intelligible without them. Submissions must be in ACM SIGPLAN format (http://www.sigplan.org/authorInformation.htm) with page numbers (so, LaTeX users should specify documentclass[10pt,preprint]{sigplanconf}). No changes to margins, spacing, or font sizes (or anything else) are allowed from those specified by the style file. We reserve the right to request the source files for a submission to verify compliance with this requirement. Only PDF files will be accepted.

All submissions must be anonymized. An author’s name should occur only in references to that author’s related work, which should be referenced in the third person and not overtly distinguishable from the referenced work of others. Submitted papers must not substantially overlap papers that have been published or that are simultaneously submitted to a journal, conference or workshop. Simultaneous submission of the same work is not allowed. Authors of accepted papers must guarantee that their papers will be presented at the conference.

Accepted papers will be published by ACM Press in conference proceedings and in the ACM Digital Library. Final proceedings versions will be 10 pages in double-column ACM format, although authors will have the option of buying a limited number of additional pages. In addition to regular papers, some short papers could also be accepted and included in the proceedings.

ASIACCS 2013 : 8th ACM Symposium on Information, Compuer and Communications Security.

Aug 09

Eleventh Smart Card Research and Advanced Application Conference – Cardis 2012

CARDIS 2012 – Call for Papers
—————————–
Eleventh Smart Card Research and Advanced Application Conference

Since 1994, CARDIS is the foremost international conference dedicated
to smart card research and applications. Smart cards and secure
elements are the basis for many secure systems and play a decisive
role in ID management. Established computer science areas like
hardware design, operating systems, system modeling, cryptography,
verification and networking got adapted to this fast growing
technology and investigate emerging issues resulting from it. Unlike
events devoted to commercial and application aspects of smart cards,
CARDIS conferences gather researchers and technologists who focus on
all aspects of the design, development, deployment, validation and
application of smart cards and secure elements in secure platforms or
systems.

The eleventh Smart Card Research and Advanced Application IFIP
Conference, organized by the Institute for Applied Information
Processing and Communications (IAIK), Graz University of Technology,
will be held in the Weitzer Hotel, Graz, Austria.
The program committee is seeking original papers on all aspects of
smart cards and secure elements. Submissions across a broad range of
the development phases are encouraged, from exploratory research and
proof-of-concept studies to practical applications and deployment of
smart cards and related technologies. Topics of interest include, but
are not limited to:
– Software for secure embedded systems (operating systems, virtual
machines, … )
– Hardware architectures for secure embedded systems
– Security of RFID systems and sensor nodes
– Security of mobile devices and applications
– Efficient and secure implementations of cryptographic algorithms
– Cryptographic protocols for embedded systems
– Physical attacks and countermeasures
– Secure applications for embedded systems
– Embedded systems networking
– Person representation in embedded systems
– Formal modeling and formal proofs
– Validation and certification of embedded systems and applications
– Identity, privacy and trust issues

Authors are invited to submit papers (PDF or PS format) with novel
contributions electronically using the submission form available on
the following web site:
http://www.easychair.org/conferences/?conf=cardis2012.
Submitted papers must be original, unpublished, anonymous and not
submitted to journals or other conferences/workshops that have
proceedings. Submissions must be written in English and should be at
most 15 pages in total. Papers not meeting these guidelines risk
rejection without consideration. All submissions will be
blind-refereed.

Submission implies the willingness of at least one of the authors to
register and present the paper. The proceedings will be published in
the Springer Lecture Notes in Computer Science (LNCS) series. Accepted
papers should follow the LNCS default author instructions at
http://www.springer.de/comp/lncs/authors.html.

Important dates
—————

Submission of papers: August 20th, 2012, 23:59 GMT+02
Notification of acceptance: October 15, 2012
Camera-ready version of papers for pre-proceedings: November 7, 2012
Workshop date: November 28–30, 2012
Final version of papers: December 17, 2012

Program Committee
—————–
N. Asokan,  Nokia Research Center, Finland
Gildas Avoine,  UCL, Belgium
Chetali Boutheina,  Trusted Labs, France
Josep Domingo Ferrer,  Rovari i Virgili University, Catalonia
Hermann Drexler,  Giesecke & Devrient, Germany
Martin Feldhofer,  NXP, Austria
Berndt Gammel,  Infineon, Germany
Tim Güneysu,  Ruhr-University Bochum, Germany
Helena Handschuh,  Cryptography Research Inc., USA and KU Leuven, Belgium
Michael Hutter,  TU Graz, Austria
Marc Joye,  Technicolor, France
Ioannis Krontiris,  Göthe Universität Frankfurt, Germany
Jean-Louis Lanet,  University of Limoges, France
Konstantinos Markantonakis,  Royal Holloway, UK
Andrew Martin,  University of Oxford, UK
David Naccache,  ENS, France
Elisabeth Oswald,  University of Bristol, UK
Catuscia Palamidessi,  INRIA, France
Eric Peeters,  Texas Instruments, USA
Erik Poll,  RU Nijmegen, Netherlands
Bart Preneel,  KU Leuven, Belgium
Emmanuel Prouff,  ANSSI, France
Matthieu Rivain,  CryptoExperts, France
Pankaj Rohatgi,  Cryptography Research, USA
Ahmad-Reza Sadeghi,  TU Darmstadt, Germany
Jean-Pierre Seifert,  TU Berlin, Germany
Sergei Skorobogatov,  Cambridge University, UK
François-Xavier Standaert,  UCL, Belgium
Frederic Stumpf,  Fraunhofer AISEC, Germany
Marc Witteman,  Riscure, Netherlands

Organizational Committee
————————
Stefan Mangard
(Program Chair)
Infineon Technologies, Germany
Email: Stefan.Mangard AT infineon.com

Jörn-Marc Schmidt
(General Chair)
Graz University of Technology, Austria
Email: joern-marc.schmidt AT iaik.tugraz.at

Jean-Jacques Quisquater
(Publicity Chair)
Université catholique de Louvain, Belgium
Email: jjq AT uclouvain.be

Jul 02

CANS 2012 – The 11th International Conference on Cryptology and Network Security

CANS 2012 – The 11th International Conference on Cryptology and Network Security
Darmstadt, Germany, December 12-14, 2012
http://cans2012.cased.de

CALL FOR PAPERS

The International Conference on Cryptology and Network Security (CANS) is a
recognized annual conference, focusing on all aspects of cryptology and
network security, attracting cutting-edge results from world-renowned
scientists in the area.

Original research papers on all technical aspects of cryptology and network
security are solicited for submission to CANS 2012. Papers suggesting novel
paradigms, original directions, or non-traditional perspectives are
especially welcome.

Topics of Interest
====================

– Access Control
– Anonymity
– Authentication, Identification
– Biometrics
– Block and Stream Ciphers
– Cloud Security
– Cryptographic Algorithms, Protocols
– Denial of Service
– Embedded Platform Security
– Hash Functions
– (Future) Internet Security
– Key Management
– Network Security
– Peer-to-Peer Security
– Identity and Trust Management
– Public-key Cryptography
– Secure Hardware
– Security Modeling and Architectures
– Spyware Analysis and Detection
– Wireless and Mobile Security

Important Dates
=================
Submission deadline: July 15, 2012, 11:00 UTC
Notification of acceptance: September 8, 2012
Camera-ready deadline: September 15, 2012
Conference:  December 12-14, 2012

Committees
===========

General chair:
– Mark Manulis, University of Surrey, UK

Program chairs:
– Josef Pieprzyk, Macquarie University, Australia
– Ahmad-Reza Sadeghi, Technische Universität Darmstadt / Fraunhofer SIT,
Germany

Program committee:
– Michel Abdalla, ENS, France
– Gildas Avoine, Université catholique de Louvain, Belgium
– Feng Bao, Institute for Infocomm Research, Singapore
– Sébastien Canard, Orange Labs, France
– Sherman Chow, University of Waterloo, Canada
– Nicolas Courtois, University College London, UK
– Emiliano De Cristofaro, PARC Research, USA
– Reza Curtmola, New Jersey Institute of Technology, USA
– George Danezis, Microsoft Research Cambridge, United Kingdom
– Roberto Di Pietro, Università di Roma Tre, Italy
– Juan Garay, AT&T Labs Research, USA
– Philip Hawkes, Qualcomm, Australia
– Amir Herzberg, Bar-Ilan University, Israel
– Nick Hopper, University of Minnesota, USA
– Stanislaw Jarecki, University of California, Irvine, USA
– Xuxian Jiang, North Carolina State University, USA
– Seny Kamara, Microsoft Research, USA
– Angelos Keromytis, Columbia University, USA
– Svein Johan Knapskog, NTNU – Trondheim, Norway
– Benoit Libert, Université Catholique de Louvain, Belgium
– Atsuko Miyaji, JAIST, Japan
– Refik Molva, Eurecom, France
– Fabian Monrose, University of North Carolina, USA
– David Naccache, Ecole Normale Supérieure, France
– Michael Nährig, Eindhoven University of Technology, Netherlands
– Eiji Okamoto, University of Tsubuka, Japan
– Claudio Orlandi, Bar-Ilan University, Israel
– Jacques Patarin, Universite de Versailles, France
– Raphael C.-W. Phan, Loughborough University, UK
– Bart Preneel, Katholieke Universiteit Leuven, Belgium
– Vincent Rijmen, TU Graz, Austria
– Matt Robshaw, Orange Labs, France
– Rei Safavi-Naini, University of Calgary, Canada
– Thomas Schneider, TU Darmstadt, Germany
– Elaine Shi (Rungting), UC Berkeley, USA
– Francois-Xavier Standaert, University catholique de Louvain, Belgium
– Douglas Stebila, Queensland University of Technology, Australia
– Ron Steinfeld, Macquarie University, Australia
– Willy Susilo, University of Wollongong, Australia
– Markus Ullmann, Federal Office for Information Security (BSI), Germany
– Ersin Uzun, PARC Research, USA
– Frederik Vercauteren, Katholieke Universiteit Leuven, Belgium
– Huaxiong Wang, Nanyang Technological University, Singapore
– Michael J. Wiener, Irdeto, Canada
– Xinwen Zhang, Huawei Research Center, USA

Local arrangements committee:
– Stanislav Bulygin, Technische Universität Darmstadt, Germany

Steering committee:
– Yvo Desmedt (Chair), University College London, UK
– Matt Franklin, University of California, Davis, USA
– Juan A. Garay, AT&T Labs – Research, USA
– Yi Mu, University of Wollongong, Australia
– David Pointcheval, CNRS and ENS Paris, France
– Huaxiong Wang, Nanyang Technological University, Singapore

Jun 29

IT security problems shift as data moves to ‘cloud’ – Yahoo! OMG! Philippines

IT security problems shift as data moves to ‘cloud’

The Internet “cloud” has become the hottest topic in computing, but the trend has created a new range of security issues that need to be addressed.

The cloud is associated with things like personal emails and music which can be accessed on computers and a range of mobile devices.

via IT security problems shift as data moves to ‘cloud’ – Yahoo! OMG! Philippines.

Jun 23

Bon mardi les amis + 19 liens encore plus extraordinaires qu’hier ! | Korben

Un ebook gratuit en PDF qui traite de la sécurité sur mobile.

via Bon mardi les amis + 19 liens encore plus extraordinaires qu’hier ! | Korben.

Jun 22

Un Français sur trois prêt à être « tracé » en magasin via un mobile pour recevoir des bons de réductions

Un Français sur trois prêt à être « tracé » en magasin via un mobile pour recevoir des bons de réductions.

Jun 20

SPSM 2012 : ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices

When Oct 19, 2012 – Oct 19, 2012
Where Raleigh, NC, USA
Submission Deadline Jul 13, 2012
Notification Due Aug 13, 2012
Final Version Due Aug 24, 2012

SPSM 2012 : ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices.

Jun 11

CALL FOR PAPERS: IEEE-AESS Conference in Europe about Space and Satellite Communications : Security and Privacy Special Track

=================================
CALL FOR PAPERS
Security and Privacy Special Track
IEEE-AESS Conference in Europe about Space and Satellite Communications (ESTEL)
Rome, Italy, October 2-5, 2012
http://estel-sec.dti.unimi.it/
=================================
The special track on Security and Privacy of the ESTEL Conference aims at providing a
forum for discussing security and privacy issues that need to be investigated for
providing advanced services, architectures, and technologies for space and satellite
applications.  In this context, it is of utmost importance to ensure proper protection to
such complex systems, or systems-of-systems, to ensure security, privacy, and availability
of the infrastructure as well as of resources and information it provides and
manages. These aspects concern both the specific satellite application and infrastructure
as well as the base stations and land data servers and communications that serve them,
touching then the different areas with ICT.  The problem is far from trivial, due to the
criticality and the social impact of the applications and services relying on this global
infrastructure, as well as the complexity given by the co-existence and co-operation of,
possibly heterogeneous, component systems. Topics of interest include, but are not limited
to:
– Access Control
– Applied Cryptography for Space Applications
– Authentication
– Biometrics Security and Privacy
– Critical Infrastructure Protection
– Data Integrity
– Data Protection
– Database Security and Privacy
– Digital Forensics
– Digital Rights Management
– Ethical and Legal Implications of Security and Privacy
– Formal Methods for Security
– Homeland Security
– Human Factors and Human Behaviour Recognition Techniques
– Identification, Authentication and Non-repudiation
– Identity Management
– Information Hiding
– Information Systems Auditing
– Insider Threats and Countermeasures
– Intellectual Property Protection
– Intrusion Detection & Prevention
– Management of Computing Security
– Organizational Security Policies
– Peer-to-Peer Security
– Privacy
– Privacy Enhancing Technologies
– Reliability and Dependability
– Risk Assessment
– Satellite-based Disaster Recovery
– Satellite Network Security
– Secure Cloud Computing
– Secure Software Development Methodologies
– Security Protocols
– Security and Privacy in Mobile Systems
– Security and Privacy in Complex Systems
– Security and Privacy in IT Outsourcing
– Security and Privacy in Location-based Services
– Security and Privacy in Pervasive/Ubiquitous Computing
– Security and Privacy in Satellite Surveillance
– Security and Privacy in Web Services
– Security and Privacy Policies
– Security Area Control
– Security Deployment
– Security Engineering
– Security for Grid Computing
– Security in Distributed Systems
– Security Information Systems Architecture and Design and Security Patterns
– Security in e-Healthcare
– Security Issues of Satellite Communications
– Security Management
– Security Metrics and Measurement
– Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
– Security Verification and Validation
– Sensor and Mobile Ad Hoc Network Security
– Service and Systems Design and QoS Network Security
– Software Security
– Trust Management and Reputation Systems
– Ubiquitous Computing Security
– Wireless Network Security
SUBMISSION INSTRUCTIONS
Submitted papers must not substantially overlap papers that have been published or that are
simultaneously submitted to a journal or a conference with proceedings. Submitted papers
must be formatted according to the IEEE Conference proceedings format, available at
http://www.ieee.org/publications_standards/publications/authors/authors_journals.html.
Submissions should be at most 6 pages. Submissions are to be made to the submission
web site at https://www.easychair.org/conferences/?conf=estelsec2012. Only pdf files will be
accepted. Submissions not meeting these guidelines risk rejection without consideration of their
merits. Papers must be received by the deadline of July 20, 2012 (11:59 p.m. American Samoa time).
All accepted papers will be published in the conference proceedings. Authors of accepted papers
must guarantee that their papers will be presented at the conference. A one-day registration
option will be made available to special session attendees.
IMPORTANT DATES
Paper submission due: July 20, 2012 (11:59 p.m. American Samoa time)
Notification to authors: August 25, 2012
Camera ready due: September 5, 2012
SPECIAL TRACK PROGRAM CHAIR
Pierangela Samarati
Universita’ degli Studi di Milano, Italy
PROGRAM COMMITTEE
tba
This call for papers and additional information about the conference
can be found at http://estel-sec.dti.unimi.it/