|
Topics of Interest
- Track 1: Mobility
- Track 2: Security
- Track 3: New
Technologies & services
Track 1:
Mobility
- Mobile
3G, 4G, LTE (Long Term Evolution), convergence (IMS,
etc.)
-
WiMAX, WLAN, DVB, WiFi
-
PAN, BAN, WSN, UWB
-
Wireless MAC protocols
-
Media sensor and ad hoc networks
-
Self-organizing of wireless networks
-
Mesh networks and autonomic systems
-
Optical networks and switching (new generation SDH,
OTN)
- Vehicular Communication Technologies and Systems
-
Mobility management and Handover
-
Scheduling Techniques for Wireless Systems
-
Routing, QoS and scheduling
-
Resource allocation management
-
Analysis, simulation, measurement and performance
evaluation
-
Cross-layer network design and optimization
-
Cognitive radio
-
Testbed experiments, Mobile/Wireless
-
Applications and Services
-
Wireless and mobile multimedia systems
-
Integration of heterogeneous mobile, wireless and
wireline networks
- Mobility,
location and handoff management
-
Wireless services and middleware platforms
Track 2 : Security
- Authentication protocols and services authorization
- Data and system integrity and confidentiality
- Availability of secure services
- Key Distribution and management, PKI and security
management
- Trust models and Trust establishment
- Identity management, authentication and access
control
- Deployment and management of computer/network
security policies
- Monitoring Design for security, distributed Intrusion
Detection Systems & Countermeasures
- Single and multi-source intrusion detection and
response
- Traffic filtering and Firewalling
- IPv6 security, IPSec, Virtual Private Networks
(VPNs)
- Privacy, contract agreements, and payment systems
- Revocation of malicious parties
- Prevention, Detection and Reaction Design
- Light-weight cryptography
- Quantum Cryptography and QKD
- Applications of Cryptography and Cryptanalysis
in communications security
- Mobile code security & Security management
- Secure PHY, MAC, Routing and upper layer protocols
- Secure Cross layer design
- Secure naming and addressing (Privacy and anonymity)
- Network security metrics and performance evaluation
- Security modelling and protocol design
- Smart cards and secure hardware
- Biometric security: technologies, risks and vulnerabilities
- Information hiding and watermarking
- Vulnerability, exploitation tools, and virus/worm
analysis
- Distributed Denial-of-Service (DDoS) attacks
and countermeasures
- Cryptographic Hardware and Embedded Systems
- Web, e-mail , m-commerce, e-business and e-commerce
security
- Testbeds, performance evaluation and formal specification
methods
- Virtualization for security and reliability
Track 3 : New Technologies and Services
- New generation Internet, Post IP and IPv6
- NGN architectures, protocols and services management
and delivery
- Web 2.0 applications and IMS (IP Multimedia Subsystems)
- Next generation systems & Service-oriented
techniques
- IPTV and content distribution networks
- User-centric networking and services
- multimedia indexing and retrieval
- Personalized access to media systems
- Context/content-aware services
- Smart Homes and E-Health
Web Commerce & Services, Data models, Web searching
& querying
- Web Mining & Web Semantics
- Web service based Grid computing and P2P computing
- Advanced identification techniques (Biometrics,
RFID, etc.)
- Virtualization technologies for grid and parallel
computing.
- Interactive media, voice and video, games, immersive
applications
- Network virtualization, virtual private networks
(VPN), and services
- VoIP protocols and services
- Web Performance
- Support for Streaming and Real-time Media
- Wireless Multimedia Services and Applications
- Service Portability across Homogeneous and Heterogeneous
Networks
- Service Provisioning Platforms & Service
Roaming
- Traffic and Service Charging
- Content Networking: Caching, Content Distribution,
Load Balancing, etc.
- Content-based networking: caching, distribution,
load balancing, resiliency
- Mobile/wireless content distribution
|
|
|