[16091] in cryptography@c2.net mail archive
[wearables] CFP: Workshop on Pervasive Computing and Communication Security (fwd from tech-wearables@bobmayo.com)
daemon@ATHENA.MIT.EDU (Eugen Leitl)
Mon Sep 6 16:43:51 2004
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Fri, 3 Sep 2004 10:44:15 +0200
From: Eugen Leitl <eugen@leitl.org>
To: Cryptography List <cryptography@metzdowd.com>
--o2M4M83gw4mfJNPm
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
From: Bob Mayo <tech-wearables@bobmayo.com>
Subject: [wearables] CFP: Workshop on Pervasive Computing and Communication=
Security
To: wearables@cc.gatech.edu
Date: Thu, 2 Sep 2004 16:36:15 -0700 (PDT)
Reply-To: tech-wearables@bobmayo.com
CALL FOR PAPERS
PerSec 2005
Second IEEE International Workshop on Pervasive Computing and
Communication Security
Held in conjunction with IEEE PerCom 2005
8 March 2005, Kauai island, Hawaii, USA
http://www.cl.cam.ac.uk/persec-2005/
Research in pervasive computing continues to gain momentum. The importance =
of
security and privacy in a pervasive computing environment cannot be
underestimated. PerSec 2005 will bring together the world's experts on this
topic and provide an international forum to stimulate and disseminate origi=
nal
research ideas and results in this field.
Contributions are solicited in all aspects of security and privacy in perva=
sive
computing, including:
Models for access control, authentication and privacy management.
Incorporation of contextual information into security and privacy models, a=
nd
mechanisms.
Management of tradeoffs between security, usability, performance, power
consumption and other attributes.
Architectures and engineering approaches to fit security and privacy featur=
es
into mobile and wearable devices.
Biometric methods for pervasive computing.
Descriptions of pilot programs, case studies, applications, and experiments
integrating security into pervasive computing.
Auditing and forensic information management in pervasive settings.
Protocols for trust management in networks for pervasive computing.
Incorporation of security into communication protocols, computing architect=
ures
and user interface designs for pervasive computing.
Impact of security and privacy in relation to the social, legal, educational
and economic implications of pervasive computing.
INSTRUCTIONS FOR AUTHORS
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Papers must be sent to persec-2005 at cl.cam.ac.uk as file attachments in A=
dobe
PDF format.
Papers must have authors' affiliation and contact information on the first
page.
Papers must be unpublished and not being considered elsewhere for publicati=
on.
In particular, papers submitted to PerSec must not be concurrently submitte=
d to
PerCom in identical or modified form.
Papers must be formatted in strict accordance with the IEEE Computer Society
author guidelines published at
ftp://pubftp.computer.org/Press/Outgoing/proceedings/INSTRUCT.HTM. For your
convenience, templates are available at
ftp://pubftp.computer.org/Press/Outgoing/proceedings/. LaTeX is recommended.
Papers are limited to 5 pages in IEEE 8.5x11 conference
format. Excessively long papers will be returned without review.
Papers selected for presentation will be published in the Workshop Proceedi=
ngs
of PerCom 2005 by IEEE Press.
IMPORTANT DATES
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Paper submission: 13 September 2004
Acceptance Notification: 15 November 2004
Camera-ready manuscripts: 29 November 2004
PerSec Workshop: 8 March 2005 (first day of PerCom, which runs until the=20
12th)
PROGRAM CO-CHAIRS
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
* Frank Stajano, University of Cambridge, UK
* Roshan Thomas, McAfee Research, USA
SECRETARY
=3D=3D=3D=3D=3D=3D=3D=3D=3D
* Boris Dragovic, University of Cambridge, UK
Contact email (goes to co-chairs and secretary): persec-2005 at=20
cl.cam.ac.uk
STEERING COMMITTEE CHAIR
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
* Ravi Sandhu, George Mason University, USA
PROGRAM COMMITTEE
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
* Tuomas Aura, Microsoft Research, UK
* Mark Corner, UMass, USA
* Srini Devadas, MIT, USA
* Boris Dragovic, University of Cambridge, UK
* Naranker Dulay, Imperial College, UK
* Kris Gaj, George Mason University, USA
* Robert Grimm, NYU, USA
* Dieter Hutter, DFKI, Germany
* Ari Juels, RSA Laboratories, USA
* Tim Kindberg, HP Labs Bristol, UK
* Cetin Kaya Koc, Oregon State University, USA
* Marc Langheinrich, ETH Zurich, Switzerland
* Mark Lomas, BIICL, UK
* Robert N. Mayo, HP Labs Palo Alto, USA
* Refik Molva, Eurecom, France
* Kai Rannenberg, University of Frankfurt, Germany
* Stephen Weis, MIT
----------
--=20
Eugen* Leitl <a href=3D"http://leitl.org">leitl</a>
______________________________________________________________
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net
--o2M4M83gw4mfJNPm
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2-rc1-SuSE (GNU/Linux)
iD8DBQFBOC7fdbAkQ4sp9r4RAmwaAJ4gCideSZa8+9KyFfQEFPWm91GdDACgtto8
8EdHQIu1+xOyrtx2nIDV+no=
=Txby
-----END PGP SIGNATURE-----
--o2M4M83gw4mfJNPm--
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com