My apologies if you receive multiple copies of this call for papers (CFP)
Submission DEADLINE: 17th October, 2014
The 6th Symposium on Security and Privacy in Next-Generation Networks (SPNGN 2015)<http://fac.ksu.edu.sa/sites/default/files/pdf_webpage_for_spngn2015.pdf>
in association with
12th International Conference on Information Technology : New Generations (ITNG 2015)<http://www.itng.info/>
April 13-15, 2015, Las Vegas, Nevada, USA
-: Accepted and registered papers will be published by IEEE Computer Society Press as well as submitted to DBLP and other Abstracting and Indexing (A&I) databases :-
-: Extended version of Distinguished Papers that are registered and presented, after further revision, will be recommended for possible publication in special issues of SCI Indexed Journals :-
Next Generation Network (NGN) nowadays plays an important role in the sector of telecommunication and has huge importance for future research. NGN communication is making the world’s life easier by giving round the clock connectivity with high data transfer. The NGN communication includes number of promising architectures as Internet of things, Personal wireless networks: body area wireless sensor network, wireless sensor and actuator network, Wireless Mesh networks, Next generation Internet, Cloud computing, LTE advanced, Machine-to-Machine network. The NGN communication must be secure and preserve the privacy of its users and requires innovative methods to address the continuous and emerging security threats.
This track is a forum for researchers, academics, and industries to debate the different issues related to security and privacy in next-Generation Networks, discuss relevant theoretical and practical solutions, and explore areas related to the theory, applications, development, experiences, and evaluation studies.
Topics of the track consist of all aspects related to security and privacy issues for Next generation. They include but are not limited to:
• Vulnerability assessment
• Mobile Identity management
• Authentication, security access policies
• Privacy-respecting Authentication
• Privacy issues in the Internet of Things
• Privacy issues in wireless networks
• Security Management of Machine-to-Machine network
• Forensics analysis
• Remote and wireless-based Biometrics system
• Mobile malware
• Mobile botnets
• Security and privacy issues in Smartphones
• Intrusion and fraud detection
• Socio-economic issues
Papers should be original and contain contributions of theoretical or experimental nature, or be unique experience reports. Interested authors should submit a 6-page summary of their original and unpublished work including 5 keywords in the CPS format to the track chair. Electronic submission in the PDF, PS or MS Word format is strongly encouraged. For instructions on electronic submissions, Click here<https://www.softconf.com/f/itng2015/>.
Best Student Paper
The Best Student Paper will be awarded at the conference. To be eligible, the student must be the sole author of the paper, or the first author and primary contributor. (The winner of the award will present the paper in a plenary session at the conference). A cover letter to the General Chair/Track Chair must identify the paper as a candidate for this competition at the time of submission.
Paper Submission: October 17th, 2014
Acceptance Notification: December 19th, 2014
Advance Registration: January 9th, 2015
Camera Ready Submission: February 13th, 2015
It is a fabulous opportunity to explore, share and experience new research ideas.
Please, forward this CFP to your friends, department colleagues, advanced graduate students and colleagues at local community/junior colleges.
wikiCFP link: http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=40116©ownerid=56958
KSU website: http://fac.ksu.edu.sa/ksaleem/announcement/77999
We look forward to seeing you at the conference venue in April 2015!
Kashif Saleem l Assistant Professor
Center of Excellence in Information Assurance (CoEIA)
Phone (+966) 11 469 6458
Fax (+966) 11 469 6452
P.O Box 92144 ~ Riyadh 11653
CoEIA web site: http://coeia.edu.sa<http://coeia.edu.sa/> , King Saud University web site: http://www.ksu.edu.sa<http://www.ksu.edu.sa/>
King Saud University
هذه الرسالة و مرفقاتها (إن وجدت) تمثل وثيقة سرية قد تحتوي على معلومات تتمتع بحماية وحصانة قانونية. إذا لم تكن الشخص المعني بهذه الرسالة يجب عليك تنبيه المُرسل بخطأ وصولها إليك، و حذف الرسالة و مرفقاتها (إن وجدت) من الحاسب الآلي الخاص بك. ولا يجوز لك نسخ هذه الرسالة أو مرفقاتها (إن وجدت) أو أي جزئ منها، أو البوح بمحتوياتها لأي شخص أو استعمالها لأي غرض. علماً بأن الإفادات و الآراء التي تحويها هذه الرسالة تعبر فقط عن رأي المُرسل و ليس بالضرورة بمركز التميز لأمن المعلومات، ولا يتحمل مركز التميز لأمن المعلومات أي مسئولية عن الأضرار الناتجة عن أي فيروسات قد يحملها هذ البريد.
Disclaimer: This message and its attachment, if any, are confidential and may contain legally privileged information. If you are not the intended recipient, please contact the sender immediately and delete this message and its attachment, if any, from your system. You should not copy this message or disclose its contents to any other person or use it for any purpose. Statements and opinions expressed in this e-mail are those of the sender, and do not necessarily reflect those of Center of Excellence in Information Assurance (CoEIA). CoEIA accepts no liability for damage caused by any virus transmitted by this email.
This communication is intended for the above named person and is confidential and / or legally privileged. Any opinion(s) expressed in this communication are not necessarily those of KSU (King Saud University). If it has come to you in error you must take no action based upon it, nor must you print it, copy it, forward it, or show it to anyone. Please delete and destroy the e-mail and any attachments and inform the sender immediately. Thank you.
KSU is not responsible for the political, religious, racial or partisan opinion in any correspondence conducted by its domain users. Therefore, any such opinion expressed, whether explicitly or implicitly, in any said correspondence is not to be interpreted as that of KSU.
KSU may monitor all incoming and outgoing e-mails in line with KSU business practice. Although KSU has taken steps to ensure that e-mails and attachments are free from any virus, we advise that, in keeping with best business practice, the recipient must ensure they are actually virus free.
For news of CHI books, courses & software, join CHI-RESOURCES
mailto: [log in to unmask]
To unsubscribe from CHI-ANNOUNCEMENTS send an email to
mailto:[log in to unmask]
For further details of CHI lists see http://listserv.acm.org