PerSec 2005
Second IEEE International Workshop on Pervasive Computing and
Communication Security
Held in conjunction with IEEE PerCom 2005
8 March 2005, Kauai island, Hawaii, USA
http://www.cl.cam.ac.uk/persec-2005/
Call for Papers
- Instructions for Authors
- Important dates
- Program Committee
| Logistics
- Registration
| Workshop Programme
(Also available as plain text.)
Research in pervasive computing continues to gain momentum. The
importance of security and privacy in a pervasive computing
environment cannot be underestimated. PerSec 2005 will bring together
the world's experts on this topic and provide an international forum
to stimulate and disseminate original research ideas and results in
this field.
Topics
Contributions are solicited in all aspects of security
and privacy in pervasive computing, including:
- Models for access control, authentication and privacy management.
- Incorporation of contextual information into security and privacy models, and mechanisms.
- Management of tradeoffs between security, usability, performance, power consumption and other attributes.
- Architectures and engineering approaches to fit security and privacy features into mobile and wearable devices.
- Biometric methods for pervasive computing.
- Descriptions of pilot programs, case studies, applications, and experiments integrating security into pervasive computing.
- Auditing and forensic information management in pervasive settings.
- Protocols for trust management in networks for pervasive computing.
- Incorporation of security into communication protocols, computing architectures and user interface designs for pervasive computing.
- Impact of security and privacy in relation to the social, legal, educational and economic implications of pervasive computing.
- Papers must be sent to persec-2005 at
cl.cam.ac.uk as file attachments in Adobe PDF format.
- Papers must
have authors' affiliation and contact information on the first
page.
- Papers must be unpublished and not being considered elsewhere
for publication. In particular, papers submitted to PerSec must not be
concurrently submitted to PerCom in identical or modified form.
- Papers must be formatted in strict accordance with the IEEE
Computer Society author guidelines. For your convenience, templates
are available. LaTeX is recommended.
- Papers are limited to 5 pages in IEEE 8.5x11 conference
format. Excessively long papers will be returned without review.
- Papers selected for presentation will be published in the Workshop
Proceedings of PerCom 2005 by IEEE Press.
- Paper submission: 13 September 2004
- Acceptance Notification: 15 November 2004
- Camera-ready manuscripts: 29 November 2004
- PerSec Workshop: 8 March 2005 (first day of PerCom, which runs until the 12th)
- Frank Stajano, University of Cambridge, UK
- Roshan Thomas, McAfee Research, USA
- Boris Dragovic, University of Cambridge, UK
Contact email (goes to co-chairs and secretary): persec-2005 at cl.cam.ac.uk
Steering Committee Chair
- Ravi Sandhu, George Mason University, USA
- Tuomas Aura, Microsoft Research, UK
- Mark Corner, UMass, USA
- Srini Devadas, MIT, USA
- Boris Dragovic, University of Cambridge, UK
- Naranker Dulay, Imperial College, UK
- Kris Gaj, George Mason University, USA
- Robert Grimm, NYU, USA
- Dieter Hutter, DFKI, Germany
- Ari Juels, RSA Laboratories, USA
- Tim Kindberg, HP Labs Bristol, UK
- Çetin Kaya Koç, Oregon State University, USA
- Marc Langheinrich, ETH Zurich, Switzerland
- Mark Lomas, BIICL, UK
- Robert N. Mayo, HP Labs Palo Alto, USA
- Refik Molva, Eurecom, France
- Kai Rannenberg, University of Frankfurt, Germany
- Stephen Weis, MIT, USA
- Stuart Wray, UK
For details on the conference hotel, accommodation, travel, tourist
information and so on, please refer to the web site of the main conference.
You may now register online at the PerCom 2005
registration page.
- Author registration: until 2004-12-17
- Early registration discount: until 2005-01-31
- Refunds: until 2005-02-18
Session 1: RFID
-
Stephen A. Weis, "Security Parallels Between People and Pervasive Devices"
- Gildas Avoine, Philippe Oechslin, "A Scalable and Provably Secure Hash-Based RFID Protocol"
- Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura, "Toward unlinkable ID Management for Multi-service Environments"
Session 2: Trust and Context-awareness
-
Markus C. Huebscher, Julie A. McCann, "A Learning Model for Trustworthiness of Context-awareness Services"
Session 3: Privacy
-
Sandford Bessler, Oliver Jorns, "A Privacy Enhanced Service Architecture for Mobile Users"
-
Martin Jacobsson, Ignas Niemegeers, "Privacy and Anonymity in Personal Networks"
-
Divyan M. Konidala, Dang N. Duc, Kwangjo Kim, "A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments"
Session 4: Low Power Systems
-
Daniel Nash, Tom Martin, Dong Ha, Michael Hsiao, "Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices"
-
Gunnar Gaubatz, Jens-Peter Kaps, Erdinc Ozturk, Berk Sunar, "State of the Art in Ultra-Low Power Public Key Cryptography for
Wireless Sensor Networks"
Top
| Call for Papers
- Instructions for Authors
- Important dates
- Program Committee
| Logistics
- Registration
| Workshop Programme
(recheck)
(recheck)