PerSec 2006

Torre di Pisa Third IEEE International Workshop on Pervasive Computing and Communication Security
Held in conjunction with IEEE PerCom 2006
13 March 2006, Pisa, Italy
http://www.cl.cam.ac.uk/persec-2006/

Call for Papers - Instructions for Authors - Important dates - Program Committee - Previous workshops | Logistics - Registration | Workshop Programme


Call for Papers

(Also available as plain text.)

Research in pervasive computing continues to gain momentum. The importance of security and privacy in a pervasive computing environment cannot be underestimated. As in previous years, PerSec 2006 will bring together the world's experts on this topic and provide an international forum to stimulate and disseminate original research ideas and results in this field.

Topics

Contributions are solicited in all aspects of security and privacy in pervasive computing, including:

Instructions for Authors

Instructions for authors of accepted papers

Important dates

Program Co-Chairs

Secretary

Contact email (goes to co-chairs and secretary): persec-2006 at cl.cam.ac.uk

Steering Committee Chair

Program Committee

Previous Persec workshops

  1. Persec 2004, Orlando, Florida, USA.
  2. Persec 2005, Kauai Island, Hawaii, USA.

Logistics

Details on the conference hotel, accommodation, travel, tourist information and so on can be found on the web site of the main conference.

Workshop Registration

You may register online at the PerCom registration page.


Workshop Programme

The 30-minute slots for paper presentations will roughly consist of 20 minutes of talk and 10 minutes of discussion and questions, not 30 minutes of uninterrupted lecturing. In the spirit of making the workshop interactive, audience participation, discussion and controversy will be actively encouraged.

08:30
Registration
09:15
Welcome address
09:30
Multi-Channel Protocols for Group Key Agreement in Arbitrary Topologies
Ford-Long Wong and Frank Stajano
PerSec-1
10:00
A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks (slides)
Tyler Moore
PerSec-2
10:30
Morning coffee (Note this is a very long break and a good opportunity for networking! Bring plenty of business cards.)
11:30
Keynote talk
Law enforcement, Forensic and Mobile Communications (slides)
David Naccache
PerSec-3
12:30
Lunch
14:00
Composition Trust Bindings in Pervasive Computing Service Composition (slides)
John Buford, Rakesh Kumar and Greg Perkins
PerSec-4
14:30
Developing a Model for Trust Management in Pervasive Devices (slides)
Florina Almenarez, Andrés Marín, Daniel Díaz and Juan Sanchez
PerSec-5
15:00
Efficiently Authenticating Code Images in Dynamically Reprogrammed Wireless Sensor Networks (slides)
Jing Deng, Richard Han and Shivakant Mishra
PerSec-6
15:30
Afternoon coffee
16:00
Introducing History-Enriched Security Context Transfer to Enhance the Security of Subsequent Handover
Ulrike Meyer and Susanne Wetzel
PerSec-7
16:30
Context and Location-Aware Encryption for Pervasive Computing Environments (slides)
Jalal Al-Muhtadi, Raquel Hill, Roy Campbell and Dennis Mickunas
PerSec-8
17:00
End of workshop

Top | Call for Papers - Instructions for Authors - Important dates - Program Committee - Previous workshops | Logistics - Registration | Workshop Programme

Valid HTML 4.0! (recheck) Valid CSS! (recheck) Best Viewed With Any Browser