The Second International Workshop on Security in Ubiquitous Computing
 Systems (SecUbiq-06), August 1-4, 2006, Seoul, Korea
 (Submissions due: 22 February 2006)

Ubiquitous computing technology provides an environment where users
expect to access resources and services anytime and anywhere.
The serious security risks and problems arise because resources
can now be accessed by almost anyone with a mobile device in
such an open model. The security threats exploited the weakness of
protocols as well as operating systems, and also extended to attack
ubiquitous applications. The security issues, such as authentication,
access control, trust management, privacy and anonymity, etc.,
should be fully addressed.

This workshop provides a forum for academic and industry
professionals to discuss recent progress in the area of ubiquitous
computing system security, and includes studies on analyses, models
and systems, new directions, and novel applications of established
mechanisms approaching the risks and concerns associated with the
utilization and acceptance of ubiquitous computing devices and systems.

Topics: Topics of interest include, but are not limited to:
* Access control
* Ad hoc and sensor network security
* Buffer overflows
* Commercial and industrial security
* Cryptographic algorithms and protocols
* Data privacy and trustiness
* Digital signatures
* Distributed denial of service attacks
* Information hiding and multimedia watermarking in distributed systems
* Internet and web security
* Intrusion detection and protection systems
* Key management and authentication
* Mobile codes security
* Network security issues and protocols
* Privacy and anonymity
* Privacy issues in the use of smart cards and RFID systems
* Security in e-commerce and e-business and other applications
* Security in P2P networks and Grid computing
* Security in distributed and parallel systems
* Software security
* Trust management

For more information, please see