Home

About IEEE GLOBECOM

Intent to Participate

Exhibitors

Patrons

 

Home
About the Conference
General Information
Events & Tours
Technical Symposia
Information for Authors/Speakers
Technical Symposia
Paper Submission
ACCESS '06 Executive
Business Forum
Design & Developers Forum
Tutorials and Workshops
Conference Program
Registration
Hotel
Visa Assistance
Expo
Committee

 


Information and Wireless Security


Symposium Chair
K.P. Subbalakshmi, Stevens Institute of Technology, ksubbala@stevens.edu

Symposium Co-Chair
Mehmet Ulema, Manhattan College, New York, mehmet.ulema@manhattan.edu

Scope
With emerging wireless network technologies such as sensor networks, grid networks, WPANs etc, access to information is becoming easier. However, in order for these networks to be used to their fullest potential, security of the data and the access medium must be guaranteed. Achieving this goal is especially challenging because of the underlying constraints such as limited battery power and bandwidth, channel interference, mobility, scalability issues etc. This symposium aims to bring together research work in the areas of information and communication security.

Papers offering novel research contributions in all aspects of Information and Communications Security are solicited for submission to the IEEE GLOBECOM 2006 Symposium on Information and Communication Security. Topics of interest include, but are not limited to the following.

Topics of Interest

  • Power-reliability-security trade-offs in wireless networks
  • Cross-layer approaches to security
  • Mobile network security
  • Key exchange, distribution and management in ad-hoc/sensor networks
  • Location aware security in mobile networks
  • Security in large scale networks
  • Throughput-Security trade-offs in wireless networks
  • Secure group multimedia communications
  • Secure PHY/MAC/routing protocols
  • Distributed security systems
  • Secure cooperation in wireless networks
  • Pricing issues
  • Jamming and counter measures
  • Attacks on security and vulnerability analysis
  • Application layer encryption
  • Emerging multimedia security standards (eg. JPSEC)
  • Digital watermarking and biometrics for secure information access
  • Steganography and covert communications
  • Capacity and security analysis of covert channels

Technical Program Committee

Maja Bystrom, Boston University, USA
Ajay Chander, DoCoMo, USA
R. Chandramouli, Stevens Institute of Technology, USA
Carlos Cordeiro, Philips Research, USA
Neil Daswani, DoCoMo, USA
Jana Dittman, Germany
Frederic Dufaux, Ecole Polytechnique Federale de Lausanne (EPFL), Switzerland
Mario Marques Freire , University of Beira Interior, Portugal
Mohamed Haleem, Stevens Institute of Technology, USA
Ravi Jain, DoCoMo, USA
Sudharman Jayaweera , Wichita State University, USA
Ton Kalker, HP Labs, USA
Ashfaq Khokhar, University of Illinois Chicago, USA
Deepa Kundur, Texas A&M University, USA
Wei Li, Fudan University, China
Ching-Yung Lin, IBM T.J. Watson Research Center, USA
Bruce McNair, Stevens Institute of Technology, USA
Madjid Merabti, Liverpool John Moores University, UK
Kamesh Namuduri, Wichita State University, USA
Bala Natarajan, Kansas State University, USA
Algirdas Pakstas, London Metropolitan University, UK
Antonio Pescape, University of Napoli "Frederico II", Italy
Mahalingam Ramkumar, Mississippi State University, USA
Nalini Ratha, IBM, USA.
Jian Ren, Michigan State University, USA
Palash Sarkar, Indian Statistical Institute, India
Nicolas Sklavos, University of Patras, Greece
Xiaolin Wu, McMaster University, Canada
Yang Xiao, University of Memphis, USA

IMPORTANT DATES

Early Registration:
30 October

Hotel Reservation Deadline:
3 November