PerSec 2006
Third IEEE International Workshop on Pervasive Computing and
Communication Security
Held in conjunction with IEEE PerCom 2006
13 March 2006, Pisa, Italy
http://www.cl.cam.ac.uk/persec-2006/
Call for Papers
- Instructions for Authors
- Important dates
- Program Committee
- Previous workshops
| Logistics
- Registration
| Workshop Programme
(Also available as plain text.)
Research in pervasive computing continues to gain momentum. The
importance of security and privacy in a pervasive computing
environment cannot be underestimated. As in previous years, PerSec
2006 will bring together the world's experts on this topic and provide
an international forum to stimulate and disseminate original research
ideas and results in this field.
Topics
Contributions are solicited in all aspects of security
and privacy in pervasive computing, including:
- Models for access control, authentication and privacy management.
- Incorporation of contextual information into security and privacy
models, and mechanisms.
- Management of tradeoffs between security, usability, performance,
power consumption and other attributes.
- Architectures and engineering approaches to fit security and
privacy features into mobile and wearable devices.
- Biometric methods for pervasive computing.
- Cryptographic primitives and protocols for pervasive computing.
- Descriptions of pilot programs, case studies, applications, and
experiments integrating security into pervasive computing.
- Auditing and forensic information management in pervasive
settings.
- Protocols for trust management in networks for pervasive
computing.
- Incorporation of security into communication protocols, computing
architectures and user interface designs for pervasive computing.
- Impact of security and privacy in relation to the social, legal,
educational and economic implications of pervasive computing.
- Papers must be submitted electronically in Adobe PDF format to the
submission server (now closed).
- Papers must have authors' affiliation and contact information on
the first page.
- Papers must be unpublished and not being considered elsewhere for
publication. In particular, papers submitted to PerSec must not be
concurrently submitted to PerCom in identical or modified form.
- Papers must be formatted in strict accordance with the IEEE
Computer Society author guidelines. For your convenience, templates
are available. LaTeX is recommended.
- Papers are limited to 5 pages in IEEE 8.5x11 conference
format. Excessively long papers will be returned without review.
- Papers selected for presentation will be published in the Workshop
Proceedings of PerCom 2006 by IEEE Press.
Instructions for authors of accepted papers
- At least one of the authors must register for PerCom and present
the paper at the workshop. Papers without a full registration will be
withdrawn from the proceedings and from the workshop programme.
- The IEEE CS Press will email you an author kit with detailed
instructions for the preparation of the camera-ready version of your
paper.
- Papers are limited to 5 pages in the IEEE 8.5x11 conference
format. You are allowed to buy a 6th page at a cost of 100 USD.
- After corrections addressing all the reviewers' comments,
camera-ready papers must be submitted directly to IEEE CS Press
(not to the PerSec organizers) following the instructions in
the author kit. The final deadline for submission of camera-ready copy
is 22 December 2005. The file name to use for submitting is the one
mentioned in the workshop programme below.
Paper submission: 1 October 2005, 23:59 UTC (extended, was 20 Sept)
Acceptance Notification: 22 November 2005 (notifications issued 16 Nov)
Camera-ready manuscripts: 22 December 2005
PerSec Workshop: 13 March 2006 (first day of
PerCom, which runs until the 17th)
- Ari Juels, RSA Laboratories, USA
- Frank Stajano, University of Cambridge, UK
- Ford-Long Wong, University of Cambridge, UK
Contact email (goes to co-chairs and secretary): persec-2006 at cl.cam.ac.uk
Steering Committee Chair
- Roshan Thomas, Sparta Inc., USA
- Tuomas Aura, Microsoft Research, UK
- Alastair Beresford, University of Cambridge, UK
- Mark Corner, Umass, USA
- Srini Devadas, MIT, USA
- Boris Dragovic, University of Cambridge, UK
- Naranker Dulay, Imperial College, UK
- Christian Gehrmann, Ericsson, Sweden
- Robert Grimm, NYU, USA
- Jaap-Henk Hoepman, Radboud University Nijmegen, The Netherlands
- Dieter Hutter, DFKI, Germany
- Sozo Inoue, Kyushu University, Japan
- Masahiro Ishiyama, Toshiba, Japan
- Markus Jakobsson, Indiana University, USA
- Tim Kindberg, HP Labs Bristol, UK
- Çetin Kaya Koç, Oregon State University, USA
- Marc Langheinrich, ETH Zurich, Switzerland
- Mark Lomas, Arabella (Arab Bank Group), UK
- Robert N. Mayo, HP Labs Palo Alto, USA
- David Molnar, UC Berkeley, USA
- Refik Molva, Eurecom, France
- Pekka Nikander, Helsinki University of Technology and Ericsson, Finland
- Radha Poovendran, University of Washington, USA
- Kai Rannenberg, Goethe University Frankfurt, Germany
- Susanne Wetzel, Stevens Institute of Technology, USA
- Stephen Weis, MIT, USA
- Stuart Wray, Royal School of Signals, UK
- Alf Zugenmaier, DoCoMo Euro-Labs, Germany
- Persec 2004, Orlando, Florida, USA.
- Persec
2005, Kauai Island, Hawaii, USA.
Details on the conference hotel, accommodation, travel, tourist
information and so on can be found on the web site of the main conference.
You may register online at the PerCom registration
page.
The 30-minute slots for paper presentations will roughly consist of
20 minutes of talk and 10 minutes of discussion and questions,
not 30 minutes of uninterrupted lecturing. In the spirit of
making the workshop interactive, audience participation, discussion
and controversy will be actively encouraged.
- 08:30
- Registration
- 09:15
- Welcome address
- 09:30
- Multi-Channel
Protocols for Group Key Agreement in Arbitrary Topologies
Ford-Long Wong and
Frank Stajano
PerSec-1
- 10:00
- A Collusion Attack
on Pairwise Key Predistribution Schemes for Distributed Sensor
Networks (slides)
Tyler Moore
PerSec-2
- 10:30
- Morning coffee (Note this is a very long break and a
good opportunity for networking! Bring plenty of business cards.)
- 11:30
- Keynote talk
Law enforcement,
Forensic and Mobile Communications (slides)
David
Naccache
PerSec-3
- 12:30
- Lunch
- 14:00
- Composition Trust Bindings in Pervasive Computing
Service Composition (slides)
John Buford, Rakesh Kumar and Greg Perkins
PerSec-4
- 14:30
- Developing a Model for Trust Management in Pervasive
Devices (slides)
Florina Almenarez, Andrés Marín, Daniel Díaz and Juan Sanchez
PerSec-5
- 15:00
- Efficiently
Authenticating Code Images in Dynamically Reprogrammed Wireless
Sensor Networks (slides)
Jing Deng, Richard
Han and Shivakant
Mishra
PerSec-6
- 15:30
- Afternoon coffee
- 16:00
- Introducing History-Enriched Security Context Transfer
to Enhance the Security of Subsequent Handover
Ulrike
Meyer and Susanne Wetzel
PerSec-7
- 16:30
- Context and
Location-Aware Encryption for Pervasive Computing
Environments (slides)
Jalal Al-Muhtadi, Raquel Hill, Roy
Campbell and Dennis Mickunas
PerSec-8
- 17:00
- End of workshop
Top
| Call for Papers
- Instructions for Authors
- Important dates
- Program Committee
- Previous workshops
| Logistics
- Registration
| Workshop Programme
(recheck)
(recheck)