******* CALL FOR PAPERS The first International Workshop on Wireless Security and Privacy (WiSP'08) www.cs.wcupa.edu/~zjiang/wisp08.htm June 20, 2008, Beijing, China held in conjunction with The 28th International Conference on Distributed Computing Systems (ICDCS'08) ------------------------------------------------------------------------------- Theme and scope: Wireless networks have experienced an explosive growth during the last few years. Nowadays, there is a large variety of networks spanning from the well-known cellular networks to non-infrastructure wireless networks such as mobile ad hoc networks and sensor networks. The security issue is a central concern for achieving secured communication in these networks. This workshop aims to bring together researchers and practitioners from wireless and sensor networking, security, cryptography, and distributed computing communities, with the goals of promoting discussions and collaborations. We are interested in novel research on all aspects of security in wireless and sensor networks and tradeoff between security and performance such as QoS, dependability, scalability, etc. ------------------------------------------------------------------------------- Topics of interest: We are seeking papers that describe original and unpublished contributions addressing various aspects of secured wireless/sensor networks. Topics of interest include, but are not limited to: . Authentication and Access Control . Cryptographic Protocol . Experimental Studies . Key Management . Information Hiding . Intrusion Detection and Response . Privacy and Anonymity . Secure Localization and Synchronization . Security and Performance tradeoff . Security Policy and Enforcement Issues . Security Protocols Design, Analysis and Verification . Secure Routing/MAC . Surveillance and Monitoring . Threat & Trust Management ------------------------------------------------------------------------------- Paper Submission: Submit an electronic version of manuscripts, not exceed 6 pages (IEEE Computer Society proceedings Manuscripts: two columns, single-spaced) to zjiang@wcupa.edu, including an abstract, 3-5 key words, the corresponding author's e-mail, figures, and references (http://www.ieee.org/portal/pages/pubs/transactions/stylesheets.html). Prepare your papers in PDF file only. Acknowledgement will be sent back for each submission within 24 hours; otherwise, a re-submission is needed. Each submitted paper will be peer reviewed and the comments will be provided to the authors. Accepted papers will be published by IEEE Computer Society Press, as proceedings of the ICDCS'08 workshops. Submission of a paper should be regarded as an undertaking that, should the paper be accepted, at least one of the authors will register and attend the workshop to present the work. ------------------------------------------------------------------------------- Special Issue: We also plan to publish the full versions of the manuscripts as a special issue of International Journal of Security and Networks (IJSN) (http://www.inderscience.com/ijsn/). Selected authors will be invited to prepare articles after the workshop, with an additional review phase by the workshop committee and journal editors. ------------------------------------------------------------------------------- Important Dates: Manuscript Submission: 11/15/2007 Acceptance Notification: 2/11/2008 Final Manuscript Due: 3/9/2008 Workshop Date: 6/20/2008 Full Version Due: 7/25/2008 ------------------------------------------------------------------------------- Workshop General-chair Dr. Sajal Das University of Texas, Arlington, USA das@cse.uta.edu ------------------------------------------------------------------------------- Workshop Program Co-chairs Dr. Zhen Jiang West Chester University, USA zjiang@wcupa.edu Dr. Xiao Chen Texas State University, USA xc10@txstate.edu ------------------------------------------------------------------------------- Steering Committee member Dr. Jie Wu National Science Foundation & Florida Atlantic University, USA ------------------------------------------------------------------------------- Program Committee A. Agah, West Chester University, USA R. Beyah, Georgia State University, USA A. Bourgeois, Georgia State University, USA S. Chen, Florida International University, USA Z. Chen, Beijing University, China B. Dragovic, Create-Net, Italy Y. Guan, Iowa State University, USA T. He, University of Minnesota, USA D. Kundor, Texas A&M University, USA M. Li, Shanghai Jiaotong University, China Q. Li, College of William and Mary, USA D. Liu, University of Texas, Arlington, USA J. Liu, Wayne State University, USA Y. Liu, Hong Kong University of Science and Technology, HK, China W. Lou, Hong Kong Polytechnic University, HK, China F. Kargl, Ulm University, Germany S. Mishra, University of Colorado, USA C. Nita-Rotaru, Purdue University, USA G. Noubir, Northeastern University, USA S. Olariu, Old Dominion University, USA B. Preneel, Katholieke Universiteit Leuven, Belgium D. Qiao, Iowa State University, USA H. Shen, University of Arkansas, USA H. Song, Frostburg State University, USA A. Weimerskirch, Escrypt Inc. - Embedded Security, USA N. Xiao, National University of Defense Technology, China Y. Xia, University of Florida, USA W. Zhang, Iowa State University, USA ******************************************************************************