<div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div><div>(Our apologies if you receive multiple copies of this CFP)</div>
<div><br></div>
<div><br></div>
<div> Fifth IFIP International Conference on</div>
<div> New Technologies, Mobility and Security</div>
<div> May 7 - 10, 2012, Istanbul- Turkey</div>
<div> <a href="http://www.ntms-conf.org/" target="_blank">http://www.ntms-conf.org</a></div>
<div><br></div>
<div> Technically Sponsored by IEEE, COMSOC and IFIP TC6</div>
<div><br></div>
<div>All accepted papers will be published in IEEE Xplore. The best papers</div>
<div>of the conference will be considered for publication in COMNET and ADHOC</div>
<div>NETWORKS journals.</div>
<div><br></div>
<div>Overview</div>
<div>--------</div>
<div>NTMS'2012 is the Fifth International Conference on New Technologies,</div>
<div>Mobility and Security that will be held from 7 to 10 May 2012 in</div>
<div>Istanbul, Turkey.</div>
<div><br></div>
<div>NTMS'2012 aims at fostering advances in the areas of New Technologies,</div>
<div>Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS,</div>
<div>Network Security and E-commerce, to mention a few, and provides a</div>
<div>dynamic forum for researchers, students and professionals to present</div>
<div>their state-of-the-art research and development in these interesting</div>
<div>areas.</div>
<div><br></div>
<div>The event will be combined with tutorial sessions and workshops.</div>
<div>Tutorials will precede the main program, aiming at the dissemination of</div>
<div>mature knowledge and technology advances in the field. Two or more</div>
<div>Workshops will immediately follow the main conference, offering the</div>
<div>opportunity for a more focused exchange of ideas and presentation of on-</div>
<div>going research relevant to following tracks (More information and the</div>
<div>full call-for-papers can be found on the conference web):</div>
<div><br></div>
<div>Track 1 : Mobility & Wireless networks</div>
<div>---------------------------------------</div>
<div>- Beyond 3G, 4G, LTE, and WiMAX Networks</div>
<div>- Wireless Local Area Networks</div>
<div>- Wireless Personal Area Networks</div>
<div>- Wireless Ad Hoc and Mesh Networks</div>
<div>- Wireless Vehicular Networks</div>
<div>- Cognitive Radio Networks</div>
<div>- Satellite Networks</div>
<div>- Self-organizing and Re-configurable Wireless Networks</div>
<div>- Energy Efficient Wireless Sensor Network Solutions</div>
<div>- Wireless MAC Protocols</div>
<div>- Scheduling Techniques for Wireless Networks</div>
<div>- Wireless QoS Routing Algorithms</div>
<div>- Radio Resource Allocation and Management</div>
<div>- Cross-layer Design and Optimization in Wireless Networks</div>
<div>- Clustering, Topology Control, Coverage and Connectivity</div>
<div>- Cooperation and Relaying in Wireless Networks</div>
<div>- Analysis, Simulation and Performance Evaluation</div>
<div>- Integration of Heterogeneous Mobile, Wireless and Wire-line Radio</div>
<div>Access Networks</div>
<div>- Mobility, Location Management and Handover Techniques for Wireless</div>
<div>Mobile Networks</div>
<div>- Multimedia over Wireless and Mobile Systems</div>
<div>- Power-aware Architectures, Algorithms and Protocols for</div>
<div>Wireless/Mobile Networks</div>
<div>- Wireless Services and Middleware Platforms</div>
<div>- Green Radio Communications</div>
<div>- Measurements, Testbeds and Deployment of Wireless Systems</div>
<div><br></div>
<div>Track 2: Security</div>
<div>-----------------</div>
<div><br></div>
<div>Thematic areas:</div>
<div>- Security engineering. Methodologies, formalisms, modeling, tools,</div>
<div>code instrumentation</div>
<div>- Cryptography. Algorithms, protocols, attacks</div>
<div>- Security in distributed systems.</div>
<div>- Cryptographic Hardware and Embedded Systems.</div>
<div>- Light-weight cryptography.</div>
<div>- Information Hiding.</div>
<div>- Steganography</div>
<div>- Privacy and Anonymity.</div>
<div>- Security assurance. Evaluation, testing, formal proofs, certification.</div>
<div>- Quantum Cryptography and QKD.</div>
<div>- Trusted computing. Analyses and attacks, practical applications...</div>
<div>- Surveillance and monitoring. Intrusion detection, monitoring</div>
<div>techniques, architectures,...</div>
<div>- Infrastructure. Middleware, proxies, PKIs, AAAs, SSO, credentials...</div>
<div>- Social and psychological aspects of security. User-centered security</div>
<div>evaluation, perception of security and threats...</div>
<div>- Security and usability.</div>
<div><br></div>
<div>Application areas:</div>
<div>- Service Oriented Computing. Platform security, access control,</div>
<div>Security of the SOC processes (Negotiation, Orchestration),</div>
<div>Identification of services...</div>
<div>- Cloud computing. Platform security, data protection, software</div>
<div>protection, surveillance and dynamic reaction.</div>
<div>- Ubiquitous computing, pervasive computing and ambient intelligence.</div>
<div>Secure system models, development support, dynamic reaction, self-</div>
<div>systems</div>
<div>- Embedded systems. Dynamic replaceability, system security assessment,</div>
<div>secure system composition, tampering-resistance...</div>
<div>- Security in system evolution. Design for secure evolution, evolution-</div>
<div>oriented surveillance, security patches...</div>
<div>- Critical infrastructures. Protection architectures, redundancy and</div>
<div>replication, scalability issues...</div>
<div><br></div>
<div>Track 3: New Technologies & services</div>
<div>------------------------------------</div>
<div>- New generation Internet, Post IP and IPv6</div>
<div>- NGN architectures, protocols and services management and delivery</div>
<div>- Web 2.0 applications and IMS (IP Multimedia Subsystems)</div>
<div>- Next generation systems & Service-oriented techniques</div>
<div>- IPTV and content distribution networks</div>
<div>- User-centric networking and services</div>
<div>- multimedia indexing and retrieval</div>
<div>- Personalized access to media systems</div>
<div>- Context/content-aware services</div>
<div>- Smart Homes and E-Health</div>
<div>- Web Commerce & Services, Data models, Web searching & querying</div>
<div>- Web Mining & Web Semantics</div>
<div>- Web service based Grid computing and P2P computing</div>
<div>- Advanced identification techniques (Biometrics, RFID, etc.)</div>
<div>- Virtualization technologies for grid and parallel computing.</div>
<div>- Interactive media, voice and video, games, immersive applications</div>
<div>- Network virtualization, virtual private networks (VPN), and services</div>
<div>- VoIP protocols and services</div>
<div>- Content-based networking: caching, distribution, load balancing,</div>
<div>resiliency</div>
<div>- Mobile/wireless content distribution</div>
<div> * * * * *</div>
<div>Submission Instructions</div>
<div>------------------------</div>
<div>Papers should be in English, strictly not exceeding 5 double-column</div>
<div>pages (3,000 words), in Adobe PDF format (which is the only accepted</div>
<div>format for NTMS 2012).</div>
<div><br></div>
<div>To access the full list of topics, submission guidelines, as well as</div>
<div>venue and travel information please visit: <a href="http://www.ntms-conf.org/" target="_blank">www.ntms-conf.org</a></div>
<div><br></div>
<div>CALL FOR WORKSHOPS</div>
<div>------------------</div>
<div>Workshop proposals should provide sufficient information to evaluate</div>
<div>the quality and importance of the topic, the goals of the workshop, and</div>
<div>the size of the interested community.</div>
<div>Proposals should identify one or more chairs and several other</div>
<div>individuals willing to serve on an organizing committee and assist with</div>
<div>publicity and reviewing.</div>
<div><br></div>
<div>Proposals should be 2-4 pages and contain at least the workshop</div>
<div>description, goals, potentieal participants and list of organizers.</div>
<div><br></div>
<div>IMPORTANT DATES</div>
<div>---------------</div>
<div>---Paper Submission Due: January 12, 2012 (Extended deadline)</div>
<div>---Paper Notification: February 22, 2012</div>
<div>---Camera Ready Due: March 07, 2012</div>
<div><br></div>
<div>Demos & NTMS Innovative Projects</div>
<div>---Demo & Innovative Projects Proposal Submission: March 29, 2012</div>
<div>---Demo & Innovative Projects Proposal Notification: April 13, 2012</div>
<div><br></div>
<div>General Chair</div>
<div>--------------</div>
<div>Albert Levi, Sabanci University, Turkey</div>
<div><br></div>
<div>TPC co-Chairs (Security Track)</div>
<div>--------------------------------</div>
<div>Antonio Mana, University of Malaga, Spain</div>
<div>Marek Klonowski, TU Wroclaw, Poland</div>
<div><br></div>
<div>TPC co-Chairs (Mobility/Wireless Track)</div>
<div>----------------------------------------</div>
<div>Ozgur Gurbuz, Sabanci University, Turkey</div>
<div>Mona Ghassemian, University of Greenwich, UK</div>
<div><br></div>
<div>TPC co-Chairs (New Technologies Track)</div>
<div>---------------------------------------</div>
<div>Matteo Cesana, Politecnico di Milano, Italy</div>
<div>Susana Sargento, Universidade de Aveiro, Portugal</div>
<div><br></div>
<div>Workshop Co-chairs</div>
<div>-------------------</div>
<div>Fatma A. Omara, Cairo University, Egypt</div>
<div>Thomas Watteyne, Dust Networks, USA</div>
<div><br></div>
<div>Publicity Chair</div>
<div>---------------</div>
<div>Mohamad Badra, Dhofar University, Oman</div>
<div>Nicolas Sklavos, Technological Educational Institute of Patras, Greece</div>
<div><br></div>
<div>Finance Chair</div>
<div>--------------</div>
<div>Ibrahim Hajjeh, Ineovation, France</div>
<div><br></div>
<div>Local Organization Committee Chair</div>
<div>----------------------------------</div>
<div>Erkay Savas, Sabanci University, Turkey</div></div></div></div></div></div>