<div dir="ltr"><div class="gmail_quote"><div class="HOEnZb"><div class="h5"><div dir="ltr">** Submission Deadline: January 12, 2012 **<br><div class="gmail_quote"><div><div><div dir="ltr"><div class="gmail_quote"><div dir="ltr">
<div class="gmail_quote"><div dir="ltr">
<div><div><div><br></div><div>(Our apologies if you receive multiple copies of this CFP)</div>
<div><br></div><div><br></div>
<div> Fifth IFIP International Conference on</div>
<div> New Technologies, Mobility and Security</div><div> May 7 - 10, 2012, Istanbul- Turkey</div><div> <a href="http://www.ntms-conf.org" target="_blank">http://www.ntms-conf.org</a></div>
<div><br></div><div> Technically Sponsored by IEEE, COMSOC and IFIP TC6</div><div><br></div><div>All accepted papers will be published in IEEE Xplore. The best papers</div><div>of the conference will be considered for publication in COMNET and ADHOC</div>
<div>NETWORKS journals.</div><div><br></div><div>Overview</div><div>--------</div><div>NTMS'2012 is the Fifth International Conference on New Technologies,</div><div>Mobility and Security that will be held from 7 to 10 May 2012 in</div>
<div>Istanbul, Turkey.</div><div><br></div><div>NTMS'2012 aims at fostering advances in the areas of New Technologies,</div><div>Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS,</div><div>Network Security and E-commerce, to mention a few, and provides a</div>
<div>dynamic forum for researchers, students and professionals to present</div><div>their state-of-the-art research and development in these interesting</div><div>areas.</div><div><br></div><div>The event will be combined with tutorial sessions and workshops.</div>
<div>Tutorials will precede the main program, aiming at the dissemination of</div><div>mature knowledge and technology advances in the field. Two or more</div><div>Workshops will immediately follow the main conference, offering the</div>
<div>opportunity for a more focused exchange of ideas and presentation of on-</div><div>going research relevant to following tracks (More information and the</div><div>full call-for-papers can be found on the conference web):</div>
<div><br></div><div>Track 1 : Mobility & Wireless networks</div><div>---------------------------------------</div><div>- Beyond 3G, 4G, LTE, and WiMAX Networks</div><div>- Wireless Local Area Networks</div><div>- Wireless Personal Area Networks</div>
<div>- Wireless Ad Hoc and Mesh Networks</div><div>- Wireless Vehicular Networks</div><div>- Cognitive Radio Networks</div><div>- Satellite Networks</div><div>- Self-organizing and Re-configurable Wireless Networks</div>
<div>
- Energy Efficient Wireless Sensor Network Solutions</div><div>- Wireless MAC Protocols</div><div>- Scheduling Techniques for Wireless Networks</div><div>- Wireless QoS Routing Algorithms</div><div>- Radio Resource Allocation and Management</div>
<div>- Cross-layer Design and Optimization in Wireless Networks</div><div>- Clustering, Topology Control, Coverage and Connectivity</div><div>- Cooperation and Relaying in Wireless Networks</div><div>- Analysis, Simulation and Performance Evaluation</div>
<div>- Integration of Heterogeneous Mobile, Wireless and Wire-line Radio</div><div>Access Networks</div><div>- Mobility, Location Management and Handover Techniques for Wireless</div><div>Mobile Networks</div><div>- Multimedia over Wireless and Mobile Systems</div>
<div>- Power-aware Architectures, Algorithms and Protocols for</div><div>Wireless/Mobile Networks</div><div>- Wireless Services and Middleware Platforms</div><div>- Green Radio Communications</div><div>- Measurements, Testbeds and Deployment of Wireless Systems</div>
<div><br></div><div>Track 2: Security</div><div>-----------------</div><div><br></div><div>Thematic areas:</div><div>- Security engineering. Methodologies, formalisms, modeling, tools,</div><div>code instrumentation</div>
<div>- Cryptography. Algorithms, protocols, attacks</div><div>- Security in distributed systems.</div><div>- Cryptographic Hardware and Embedded Systems.</div><div>- Light-weight cryptography.</div><div>- Information Hiding.</div>
<div>- Steganography</div><div>- Privacy and Anonymity.</div><div>- Security assurance. Evaluation, testing, formal proofs, certification.</div><div>- Quantum Cryptography and QKD.</div><div>- Trusted computing. Analyses and attacks, practical applications...</div>
<div>- Surveillance and monitoring. Intrusion detection, monitoring</div><div>techniques, architectures,...</div><div>- Infrastructure. Middleware, proxies, PKIs, AAAs, SSO, credentials...</div><div>- Social and psychological aspects of security. User-centered security</div>
<div>evaluation, perception of security and threats...</div><div>- Security and usability.</div><div><br></div><div>Application areas:</div><div>- Service Oriented Computing. Platform security, access control,</div><div>
Security of the SOC processes (Negotiation, Orchestration),</div>
<div>Identification of services...</div><div>- Cloud computing. Platform security, data protection, software</div><div>protection, surveillance and dynamic reaction.</div><div>- Ubiquitous computing, pervasive computing and ambient intelligence.</div>
<div>Secure system models, development support, dynamic reaction, self-</div><div>systems</div><div>- Embedded systems. Dynamic replaceability, system security assessment,</div><div>secure system composition, tampering-resistance...</div>
<div>- Security in system evolution. Design for secure evolution, evolution-</div><div>oriented surveillance, security patches...</div><div>- Critical infrastructures. Protection architectures, redundancy and</div><div>replication, scalability issues...</div>
<div><br></div><div>Track 3: New Technologies & services</div><div>------------------------------------</div><div>- New generation Internet, Post IP and IPv6</div><div>- NGN architectures, protocols and services management and delivery</div>
<div>- Web 2.0 applications and IMS (IP Multimedia Subsystems)</div><div>- Next generation systems & Service-oriented techniques</div><div>- IPTV and content distribution networks</div><div>- User-centric networking and services</div>
<div>- multimedia indexing and retrieval</div><div>- Personalized access to media systems</div><div>- Context/content-aware services</div><div>- Smart Homes and E-Health</div><div>- Web Commerce & Services, Data models, Web searching & querying</div>
<div>- Web Mining & Web Semantics</div><div>- Web service based Grid computing and P2P computing</div><div>- Advanced identification techniques (Biometrics, RFID, etc.)</div><div>- Virtualization technologies for grid and parallel computing.</div>
<div>- Interactive media, voice and video, games, immersive applications</div><div>- Network virtualization, virtual private networks (VPN), and services</div><div>- VoIP protocols and services</div><div>- Content-based networking: caching, distribution, load balancing,</div>
<div>resiliency</div><div>- Mobile/wireless content distribution</div><div> * * * * *</div><div>Submission Instructions</div><div>------------------------</div><div>Papers should be in English, strictly not exceeding 5 double-column</div>
<div>pages (3,000 words), in Adobe PDF format (which is the only accepted</div><div>format for NTMS 2012).</div><div><br></div><div>To access the full list of topics, submission guidelines, as well as</div><div>venue and travel information please visit: <a href="http://www.ntms-conf.org" target="_blank">www.ntms-conf.org</a></div>
<div><br></div><div>CALL FOR WORKSHOPS</div><div>------------------</div><div>Workshop proposals should provide sufficient information to evaluate</div><div>the quality and importance of the topic, the goals of the workshop, and</div>
<div>the size of the interested community.</div><div>Proposals should identify one or more chairs and several other</div><div>individuals willing to serve on an organizing committee and assist with</div><div>publicity and reviewing.</div>
<div><br></div><div>Proposals should be 2-4 pages and contain at least the workshop</div><div>description, goals, potentieal participants and list of organizers.</div><div><br></div><div>IMPORTANT DATES</div><div>---------------</div>
<div>---Paper Submission Due: January 12, 2012 (Extended deadline)</div><div>---Paper Notification: February 22, 2012</div><div>---Camera Ready Due: March 07, 2012</div><div><br></div><div>Demos & NTMS Innovative Projects</div>
<div>---Demo & Innovative Projects Proposal Submission: March 29, 2012</div><div>---Demo & Innovative Projects Proposal Notification: April 13, 2012</div><div><br></div><div>General Chair</div><div>--------------</div>
<div>Albert Levi, Sabanci University, Turkey</div><div><br></div><div>TPC co-Chairs (Security Track)</div><div>--------------------------------</div><div>Antonio Mana, University of Malaga, Spain</div><div>Marek Klonowski, TU Wroclaw, Poland</div>
<div><br></div><div>TPC co-Chairs (Mobility/Wireless Track)</div><div>----------------------------------------</div><div>Ozgur Gurbuz, Sabanci University, Turkey</div><div>Mona Ghassemian, University of Greenwich, UK</div>
<div><br></div><div>TPC co-Chairs (New Technologies Track)</div><div>---------------------------------------</div><div>Matteo Cesana, Politecnico di Milano, Italy</div><div>Susana Sargento, Universidade de Aveiro, Portugal</div>
<div><br></div><div>Workshop Co-chairs</div><div>-------------------</div><div>Fatma A. Omara, Cairo University, Egypt</div><div>Thomas Watteyne, Dust Networks, USA</div><div><br></div><div>Publicity Chair</div><div>---------------</div>
<div>Mohamad Badra, Dhofar University, Oman</div><div>Nicolas Sklavos, Technological Educational Institute of Patras, Greece</div><div><br></div><div>Finance Chair</div><div>--------------</div><div>Ibrahim Hajjeh, Ineovation, France</div>
<div><br></div><div>Local Organization Committee Chair</div><div>----------------------------------</div><div>Erkay Savas, Sabanci University, Turkey</div></div></div></div>
</div><br></div>
</div><br></div>
</div></div></div><br></div>
</div></div></div><br></div>