|
TOPICS
OF INTEREST
Track
1 : Mobility
- Mobile 3G,
4G, LTE (Long Term Evolution), convergence (IMS, etc.)
- WiMAX, WLAN,
DVB, WiFi
- PAN, BAN, WSN,
UWB
- Wireless MAC
protocols
- Media sensor
and ad hoc networks
- Self-organizing
of wireless networks
- Mesh networks
and autonomic systems
- Optical networks
and switching (new generation SDH, OTN)
- Satellite
Systems
- Vehicular
Communication Technologies and Systems
- Mobility management
and Handover
- Scheduling
Techniques for Wireless Systems
- Routing, QoS
and scheduling
- Resource allocation
management Analysis, simulation, measurement and performance evaluation
- Cross-layer
network design and optimization Cognitive radio and smart antenna
- Testbed experiments,
Mobile/Wireless Applications and Services
- Wireless and
mobile multimedia systems
- Integration
of heterogeneous mobile, wireless and wireline networks
- Mobility, location
and handoff management
- Wireless services
and middleware platforms
Track
2: Security
- Authentication
protocols and services authorization
- Data and system
integrity and confidentiality
- Availability
of secure services
- Key Distribution
and management, PKI and security management
- Trust models
and Trust establishment
- Identity management,
authentication and access control
- Deployment
and management of computer/network security policies
- Monitoring
Design for security, distributed Intrusion Detection Systems &
Countermeasures
- Single and
multi-source intrusion detection and response
- Traffic filtering
and Firewalling
- IPv6 security,
IPSec, Virtual Private Networks (VPNs)
- Privacy, contract
agreements, and payment systems
- Prevention,
Detection and Reaction Design, and Revocation of malicious parties
- Light-weight
cryptography
- Quantum Cryptography
and QKD
- Applications
of Cryptography and Cryptanalysis in communications security
- Mobile code
security & Security management
- Secure PHY,
MAC, Routing and upper layer protocols
- Secure Cross
layer design
- Secure naming
and addressing (Privacy and anonymity)
- Network security
metrics and performance evaluation
- Security modelling
and protocol design
- Smart cards
and secure hardware
- Biometric security:
technologies, risks and vulnerabilities
- Information
hiding and watermarking
- Vulnerability,
exploitation tools, and virus/worm analysis
- Distributed
Denial-of-Service (DDoS) attacks and countermeasures
- Cryptographic
Hardware and Embedded Systems
- Web, e-mail
, m-commerce, e-business and e-commerce security
- Testbeds,
performance evaluation and formal specification methods
- Virtualization
for security and reliability
Track 3: New Technologies & services
- New generation
Internet, Post IP and IPv6
- NGN architectures,
protocols and services management and delivery
- Web 2.0 applications
and IMS (IP Multimedia Subsystems)
- Next generation
systems & Service-oriented techniques
- IPTV and content
distribution networks
- User-centric
networking and services
- multimedia
indexing and retrieval
- Personalized
access to media systems
- Context/content-aware
services
- Smart Homes
and E-Health
- Web Commerce
& Services, Data models, Web searching & querying
- Web Mining
& Web Semantics
- Web service
based Grid computing and P2P computing
- Advanced identification
techniques (Biometrics, RFID, etc.)
- Virtualization
technologies for grid and parallel computing.
- Interactive media, voice
and video, games, immersive applications
- Network virtualization,
virtual private networks (VPN), and services
- VoIP protocols and
services
- Content-based networking:
caching, distribution, load balancing, resiliency
- Mobile/wireless content
distribution
|