SecPri_WiMob 2008
International Workshop on Security and Privacy in Wireless and Mobile
Computing, Networking and Communications, 
Avignon, France October 12, 2008.
(in conjunction with the IEEE WiMob 4th International Conference on
Wireless and Mobile Computing, Networking and Communications 
Guest Editors
Peter Mueller, IBM Zurich Research Lab., Switzerland 
Stefanos Gritzalis, University of the Aegean, Greece
Kaisa Nyberg, Helsinki University of Technology and Nokia Research
Center, Finland 
Costas Lambrinoudakis, University of the Aegean, Greece
Special issue important dates
Submission of papers: May 16, 2008
Notification of acceptance/rejection: July 1, 2008
Camera-ready version of papers: July 20, 2008
SecPri_WiMob 2008 Workshop date: October 12, 2008
Accepted papers will be published by IEEE Computer Society Press in the
IEEE WiMob Conference Proceedings and will be distributed at the
Aims and Scope
Wireless and Mobile communication networks offer organizations and users
several benefits, such as portability, mobility and flexibility, while
increasing everyday business productivity, and reducing installation
cost. Wireless Local Area Networks, for instance, have been used in
various environments, such as business, home, conference centers,
airports and many more, allowing users to move from place to place,
avoiding cabling restrictions and without being disconnected from the
network. Ad Hoc Networks are collections of wireless computers
communicating among themselves over possibly multihop paths, without the
help of any infrastructure such as base stations or access points; these
networks allow data synchronization with network systems and application
sharing between devices. Mobile Ad Hoc Networks are autonomous
collection of mobile entities that communicate over relatively bandwidth
constrained wireless links, establishing survivable, efficient, dynamic
communication for emergency operations. Wireless Ad Hoc Sensor Networks
consist of a number of sensors spread across a geographical area,
offering certain capabilities and enhancements in operational efficiency
in civilian applications, as well as assisting in international effort
to increase alertness to potential threats. 

However, although Wireless and Mobile communication environments
eliminate many of the problems associated with traditional wired
networks, the new security and privacy risks introduced by such
environments need to be reduced by exploiting appropriate security
measures and safeguards, ensuring an acceptable level of overall
residual hazard. 

The objectives of the SecPri_WiMob 2008 Workshop are to bring together
researchers from research communities in Wireless and Mobile Computing,
Networking and Communications, Security and Privacy, with the goal of
fostering interaction.

List of topics

We welcome the submission of papers from the full spectrum of issues
related with Security and Privacy in Wireless and Mobile Computing,
Networking and Communications. Papers may focus on protocols,
architectures, methods, technologies, applications, practical
experiences, simulation results and analysis, theory and validation on
topics include, but not limited to:

*         Cryptographic Protocols for Mobile and Wireless Networks
*         Key Management in Mobile and Wireless Computing 
*         Reasoning about Security and Privacy
*         Privacy and Anonymity in Mobile and Wireless Computing
*         Public Key Infrastructure in Mobile and Wireless Environments
*         Economics of Security and Privacy in Wireless and Mobile
*         Security Architectures and Protocols in Wireless LANs
*         Security Architectures and Protocols in B3G/4G Mobile Networks
*         Security and Privacy features into Mobile and Wearable devices

*         Location Privacy
*         Ad hoc Networks Security 
*         Sensor Networks Security
*         Wireless Ad Hoc Networks Security
*         Role of Sensors to Enable Security
*         Security and Privacy in Pervasive Computing 
*         Trust Establishment, Negotiation, and Management 
*         Secure PHY/MAC/routing protocols 
*         Security under Resource Constraints (bandwidth, computation
           constraints, energy)