18.234 security in pervasive computing

From: Humanist Discussion Group (by way of Willard McCarty willard.mccarty_at_kcl.ac.uk>
Date: Fri, 24 Sep 2004 07:29:43 +0100

               Humanist Discussion Group, Vol. 18, No. 234.
       Centre for Computing in the Humanities, King's College London
                     Submit to: humanist_at_princeton.edu

         Date: Fri, 24 Sep 2004 07:16:06 +0100
         From: Dieter Hutter <hutter_at_dfki.de>
         Subject: CfP: 2nd International Conference on Security in
Pervasive Computing, SPC2005

                 Call for Papers

           2nd International Conference on
       Security in Pervasive Computing, SPC2005
            April 6-8, 2005 Boppard, Germany


Deadline: October 15, 2004

The ongoing shrinking of computing facilities to small and mobile
devices like handhelds, portables or even wearable computers will
enhance an ubiquitous information processing. The basic paradigm
of such a pervasive computing is the combination of strongly
decentralized and distributed computing with the help of diversified
devices allowing for spontaneous connectivity. Computers will become
invisible to the users awareness and exchange of information between
devices will effectively defy users control.

The objective of this conference is to develop new security concepts
for complex application scenarios based on systems like handhelds,
phones, smartcards, RF-chips and smart labels hand in hand with the
emerging technology of ubiquitous and pervasive computing. Particular
topics include but are not limited to methods and technologies
· the identification of risks,
· the definition of security policies, and
· the development of security and privacy measures especially
          cryptographic protocols
related to the specific aspects of ubiquitous and pervasive computing
like mobility, location based services, ad-hoc networking, resource
allocation/restriction, invisibility and secure hardware/software

Important Dates:

Submission of papers: October 15, 2004
Notification: December 15, 2004
Camera ready copy: January 15, 2005
Conference: April, 6 - 8, 2005


We welcome the submission of papers from the full spectrum of issues
associated with security in pervasive computing. Submitted papers must
not substantially overlap with papers that have been published or that
are simultaneously submitted to a journal or a conference with proceedings.

The accepted papers will be published in the Springer Lecture Notes
Series on Computer Science (LNCS).

Papers should be at most 15 pages total (Springer LNCS style). The paper
should start with the title, names of authors and an abstract. All papers
must be submitted electronically. Details will be published on the web
page of the conference



The conference will be held at an old former monastery in Boppard, Germany.
Boppard is a nice small town located in the rhine valley about one hour away
from Frankfurt airport.


The conference will be organised jointly by
- Federal Office for Information Security (BSI)
- German Research Center for Artificial Intelligence (DFKI)

Program Committee:

N. Asokan (Nokia Research), FI
Michael Beigl (University of Karlsruhe), DE
Sonja Buchegger (EPFL), CH
Dieter Hutter (DFKI) (co program chair), DE
Ari Juels (RSA Laboratories), US
Paul Karger (IBM Watson Research), US
Dennis Kügler (BSI), DE
Catherine Meadows (Naval Research Lab), US
Takashi Moriyasu (Hitachi Ltd), JP
Günter Müller (University of Freiburg), DE
Panos Papadimitratos (Cornell University), US
Joachim Posegga (University of Hamburg), DE
Yves Roudier (Institute EURECOM), FR
Frank Stajano (University of Cambridge), GB
Andrei Serjantov (The Free Haven Project), GB
Werner Stephan (DFKI), DE
Seiji Tomita (NTT Information Platform Laboratories), JP
Markus Ullmann (BSI) (co program chair), DE
Received on Fri Sep 24 2004 - 02:36:37 EDT

This archive was generated by hypermail 2.2.0 : Fri Sep 24 2004 - 02:36:39 EDT