[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
[no subject]
=09by mizar.uwb.edu.pl (Postfix) with ESMTP id 2163D152F4
=09for <mizar-forum@mizar.uwb.edu.pl>; Thu, 23 Sep 2004 10:06:21 +0200 (CES=
T)
Received: from corp-200.dfki.uni-sb.de (corp-200.dfki.uni-sb.de [134.96.188=
=2E10])
=09by mailgate.uwb.edu.pl (8.12.11/8.12.11) with ESMTP id i8N86CxH026308
=09for <mizar-forum@mizar.uwb.edu.pl>; Thu, 23 Sep 2004 10:06:12 +0200
Received: from corp-200.dfki.uni-sb.de (IDENT:root@localhost [127.0.0.1])
=09by corp-200.dfki.uni-sb.de (8.12.10/8.12.9) with ESMTP id i8N860SX007518
=09for <mizar-forum@mizar.uwb.edu.pl>; Thu, 23 Sep 2004 10:06:01 +0200 (MET=
DST)
Received: from ws-421.dfki.uni-sb.de (ws-421.dfki.uni-sb.de [134.96.184.46]=
)
=09by corp-200.dfki.uni-sb.de (8.12.10/8.12.6) with ESMTP id i8N85uNr007476
=09for <mizar-forum@mizar.uwb.edu.pl>; Thu, 23 Sep 2004 10:05:57 +0200 (MET=
DST)
Received: from ws-421.dfki.uni-sb.de (localhost [127.0.0.1])
=09by ws-421.dfki.uni-sb.de (8.12.7/8.12.7/SuSE Linux 0.6) with ESMTP id i8=
N8AF0g016996
=09for <mizar-forum@mizar.uwb.edu.pl>; Thu, 23 Sep 2004 10:10:16 +0200
Message-Id: <200409230810.i8N8AF0g016996@ws-421.dfki.uni-sb.de>
To: mizar-forum@mizar.uwb.edu.pl
Subject: [mizar] CfP: 2nd International Conference on Security in Pervasive Computi=
ng, SPC2005
Date: Thu, 23 Sep 2004 10:10:15 +0200
From: Dieter Hutter <hutter@dfki.de>
X-UwB_mailgate-MailScanner-Information: Uniwersytet w Bialymstoku; e-mail:d=
ask@uwb.edu.pl
X-UwB_mailgate-MailScanner: Found to be clean
X-UwB_mailgate-MailScanner-SpamCheck:=20
X-MailScanner-From: hutter@dfki.de
Sender: owner-mizar-forum@mizar.uwb.edu.pl
Precedence: bulk
Reply-To: mizar-forum@mizar.uwb.edu.pl
Call for Papers
---------------
2nd International Conference on=20
Security in Pervasive Computing, SPC2005
April 6-8, 2005 Boppard, Germany
http://www.spc-conf.org
Deadline: October 15, 2004
The ongoing shrinking of computing facilities to small and mobile=20
devices like handhelds, portables or even wearable computers will=20
enhance an ubiquitous information processing. The basic paradigm=20
of such a pervasive computing is the combination of strongly=20
decentralized and distributed computing with the help of diversified=20
devices allowing for spontaneous connectivity. Computers will become=20
invisible to the users awareness and exchange of information between=20
devices will effectively defy users control.
The objective of this conference is to develop new security concepts=20
for complex application scenarios based on systems like handhelds,=20
phones, smartcards, RF-chips and smart labels hand in hand with the=20
emerging technology of ubiquitous and pervasive computing. Particular=20
topics include but are not limited to methods and technologies=20
concerning:=20
=B7=09the identification of risks,=20
=B7=09the definition of security policies, and=20
=B7=09the development of security and privacy measures especially=20
cryptographic protocols=20
related to the specific aspects of ubiquitous and pervasive computing=20
like mobility, location based services, ad-hoc networking, resource=20
allocation/restriction, invisibility and secure hardware/software=20
platforms.
Important Dates:
Submission of papers: =09=09October 15, 2004
Notification:=09=09=09December 15, 2004
Camera ready copy:=09=09January 15, 2005
Conference:=09=09=09April, 6 - 8, 2005
Submissions:
We welcome the submission of papers from the full spectrum of issues=20
associated with security in pervasive computing. Submitted papers must=20
not substantially overlap with papers that have been published or that=20
are simultaneously submitted to a journal or a conference with proceedings.
The accepted papers will be published in the Springer Lecture Notes=20
Series on Computer Science (LNCS).
Papers should be at most 15 pages total (Springer LNCS style). The paper
should start with the title, names of authors and an abstract. All papers=
=20
must be submitted electronically. Details will be published on the web
page of the conference=20
http://www.spc-conf.org
Location:
The conference will be held at an old former monastery in Boppard, Germany.=
=20
Boppard is a nice small town located in the rhine valley about one hour awa=
y=20
from Frankfurt airport.
Organisation:
The conference will be organised jointly by=20
- Federal Office for Information Security (BSI)=20
- German Research Center for Artificial Intelligence (DFKI)=20
Program Committee:
N. Asokan (Nokia Research), FI
Michael Beigl (University of Karlsruhe), DE
Sonja Buchegger (EPFL), CH
Dieter Hutter (DFKI) (co program chair), DE
Ari Juels (RSA Laboratories), US
Paul Karger (IBM Watson Research), US
Dennis K=FCgler (BSI), DE
Catherine Meadows (Naval Research Lab), US
Takashi Moriyasu (Hitachi Ltd), JP
G=FCnter M=FCller (University of Freiburg), DE
Panos Papadimitratos (Cornell University), US
Joachim Posegga (University of Hamburg), DE
Yves Roudier (Institute EURECOM), FR
Frank Stajano (University of Cambridge), GB
Andrei Serjantov (The Free Haven Project), GB
Werner Stephan (DFKI), DE
Seiji Tomita (NTT Information Platform Laboratories), JP
Markus Ullmann (BSI) (co program chair), DE
=20
=20
=09
=20