Workshops (new!)
4th SCLP'2011 workshop

Related Events


Topics of Interest

  • Track 1: Mobility
  • Track 2: Security
  • Track 3: New Technologies & services

Track 1: Mobility

  • Mobile 3G, 4G, LTE (Long Term Evolution), convergence (IMS, etc.)
  • WiMAX, WLAN, DVB, WiFi
  • Wireless MAC protocols
  • Media sensor and ad hoc networks
  • Self-organizing of wireless networks
  • Mesh networks and autonomic systems
  • Optical networks and switching (new generation SDH, OTN)
  • Vehicular Communication Technologies and Systems
  • Mobility management and Handover
  • Scheduling Techniques for Wireless Systems
  • Routing, QoS and scheduling
  • Resource allocation management
  • Analysis, simulation, measurement and performance evaluation
  • Cross-layer network design and optimization
  • Cognitive radio
  • Testbed experiments, Mobile/Wireless
  • Applications and Services
  • Wireless and mobile multimedia systems
  • Integration of heterogeneous mobile, wireless and wireline networks
  • Mobility, location and handoff management
  • Wireless services and middleware platforms

Track 2 : Security

  • Authentication protocols and services authorization
  • Data and system integrity and confidentiality
  • Availability of secure services
  • Key Distribution and management, PKI and security management
  • Trust models and Trust establishment
  • Identity management, authentication and access control
  • Deployment and management of computer/network security policies
  • Monitoring Design for security, distributed Intrusion Detection Systems & Countermeasures
  • Single and multi-source intrusion detection and response
  • Traffic filtering and Firewalling
  • IPv6 security, IPSec, Virtual Private Networks (VPNs)
  • Privacy, contract agreements, and payment systems
  • Revocation of malicious parties
  • Prevention, Detection and Reaction Design
  • Light-weight cryptography
  • Quantum Cryptography and QKD
  • Applications of Cryptography and Cryptanalysis in communications security
  • Mobile code security & Security management
  • Secure PHY, MAC, Routing and upper layer protocols
  • Secure Cross layer design
  • Secure naming and addressing (Privacy and anonymity)
  • Network security metrics and performance evaluation
  • Security modelling and protocol design
  • Smart cards and secure hardware
  • Biometric security: technologies, risks and vulnerabilities
  • Information hiding and watermarking
  • Vulnerability, exploitation tools, and virus/worm analysis
  • Distributed Denial-of-Service (DDoS) attacks and countermeasures
  • Cryptographic Hardware and Embedded Systems
  • Web, e-mail , m-commerce, e-business and e-commerce security
  • Testbeds, performance evaluation and formal specification methods
  • Virtualization for security and reliability

Track 3 : New Technologies and Services

  • New generation Internet, Post IP and IPv6
  • NGN architectures, protocols and services management and delivery
  • Web 2.0 applications and IMS (IP Multimedia Subsystems)
  • Next generation systems & Service-oriented techniques
  • IPTV and content distribution networks
  • User-centric networking and services
  • multimedia indexing and retrieval
  • Personalized access to media systems
  • Context/content-aware services
  • Smart Homes and E-Health
    Web Commerce & Services, Data models, Web searching & querying
  • Web Mining & Web Semantics
  • Web service based Grid computing and P2P computing
  • Advanced identification techniques (Biometrics, RFID, etc.)
  • Virtualization technologies for grid and parallel computing.
  • Interactive media, voice and video, games, immersive applications
  • Network virtualization, virtual private networks (VPN), and services
  • VoIP protocols and services
  • Web Performance
  • Support for Streaming and Real-time Media
  • Wireless Multimedia Services and Applications
  • Service Portability across Homogeneous and Heterogeneous Networks
  • Service Provisioning Platforms & Service Roaming
  • Traffic and Service Charging
  • Content Networking: Caching, Content Distribution, Load Balancing, etc.
  • Content-based networking: caching, distribution, load balancing, resiliency
  • Mobile/wireless content distribution



ICC Event