First Workshop on the Security and Privacy of
| |
Important Dates
Contact Information
Program Co-Chairs
Technical Program Committee
Advance Program |
To be held in conjunction with
August 10, 2007 - Philadelphia, Pennsylvania, USA Recent advances of wireless communications and computing have led to the rapid development of pervasive/ubiquitous systems that are built upon large number of networked embedded nodes. As the networked systems become increasingly ubiquitous, they will be both the target and the means for a variety of security and privacy threats. For example, the pervasiveness of emerging wireless systems, such as sensor devices or RFID tags or even the eventual cognitive radio platform, implies that these devices will be affordable and easily accessible, thereby making it easier than ever before for adversaries to acquire the equipment and the means to launch new modes of security or privacy attacks. Further complicating matters is the fact that ubiquitous presence implies a necessary dependence on the wireless medium, which is an open, broadcast medium that can be easily monitored. Finally, pervasive systems built upon wireless technology are dependent upon many more parameters than other systems do, such as location, and these systems generate much more data that can be easily abused to raise security/privacy concerns. These challenges are distinctively different from those in traditional wired and wireless systems. This workshop is intended to bring together researchers and practitioners to identify the new challenges imposed by emerging ubiquitous communication systems and investigating efficient models, algorithms, and tools to enhance the security and privacy of these systems. Topics of interest will include, but are not limited to:
Submission InstructionsPapers should be in PDF format, no longer than 6 pages double column in IEEE conference format including text, figures and references. The font size must be 10 points. Paper submission will be handled electronically by the COCUS Conference Management System. Further details about the submission procedures will appear soon. |