The 6th Symposium on Security and Privacy in Next-Generation Networks (SPNGN

in association with

12th International Conference on Information Technology : New Generations (ITNG

April 13-15, 2015, Las Vegas, Nevada, USA

-: Accepted and registered papers will be *published by IEEE Computer
Society Press *as well as submitted to *DBLP* and other Abstracting and
Indexing (A&I) databases :-

-: Extended version of Distinguished Papers that are registered and
presented, after further revision, will be recommended for possible
publication in special issues of SCI Indexed Journals :-

-:Best Paper Award with waiver of registration fees:-


Next Generation Network (NGN) nowadays plays an important role in the
sector of telecommunication and has huge importance for future research.
NGN communication is making the world’s life easier by giving round the
clock connectivity with high data transfer. The NGN communication includes
number of promising architectures as Internet of things, Personal wireless
networks: body area wireless sensor network, wireless sensor and actuator
network, Wireless Mesh networks, Next generation Internet, Cloud computing,
LTE advanced, Machine-to-Machine network. The NGN communication must be
secure and preserve the privacy of its users and requires innovative
methods to address the continuous and emerging security threats.

This track is a forum for researchers, academics, and industries to debate
the different issues related to security and privacy in next-Generation
Networks, discuss relevant theoretical and practical solutions, and explore
areas related to the theory, applications, development, experiences, and
evaluation studies.


Topics of the track consist of all aspects related to security and privacy
issues for Next generation. They include but are not limited to:

 . Vulnerability assessment

 . Mobile Identity management

 . Authentication, security access policies

 . Privacy-respecting Authentication

 . Privacy issues in the Internet of Things

 . Privacy issues in wireless networks

 . Security Management of Machine-to-Machine network

 . Forensics analysis

 . Remote and wireless-based Biometrics system

 . Mobile malware

 . Mobile botnets

 . Security and privacy issues in Smartphones

 . Intrusion and fraud detection

 . Socio-economic issues

*Paper Submission*

Papers should be original and contain contributions of theoretical or
experimental nature, or be unique experience reports. Interested authors
should submit a 6-page summary of their original and unpublished work
including 5 keywords in the CPS format to the track chair. Electronic
submission in the PDF, PS or MS Word format is strongly encouraged. For
instructions on electronic submissions, Click here .

*Best Student Paper*

The Best Student Paper will be awarded at the conference. To be eligible,
the student must be the sole author of the paper, or the first author and
primary contributor. (The winner of the award will present the paper in a
plenary session at the conference). A cover letter to the General
Chair/Track Chair must identify the paper as a candidate for this
competition at the time of submission.

*Important Dates*

Extended Hard DEADLINE: November 17th, 2014
Acceptance Notification: December 19th, 2014
Advance Registration: January 9th, 2015
Camera Ready Submission: February 13th, 2015

It is a fabulous opportunity to explore, share and experience new research

Please, forward this CFP to your friends, department colleagues, advanced
graduate students and colleagues at local community/junior colleges.

wikiCFP link:©ownerid=56958

KSU website:

We look forward to seeing you at the conference venue in April 2015!

Best Regards,

*Kashif Saleem, Ph.D. l Assistant ProfessorCenter of Excellence in
Information Assurance (CoEIA)Phone (+966) 1 469 6458Fax (+966) 1 469
5237P.O Box  71704 ~ Riyadh 11597* 

*CoEIA web site: , King Saud
University web site: 

*King Saud University*