<P class=bodytext>With the rapid technological development of information technologies and with the transition from the common to the next generation networks, computer systems and especially embedded systems are becoming more mobile and ubiquitous, increasingly interfacing with the physical world. Ensuring the security of these complex and yet, resource constraint systems has emerged as one of the most pressing challenges. Another important challenge is related to the convergence of these new technologies.<BR>The aim of this second workshop is to bring together researchers and practitioners in related areas and to encourage interchange and cooperation between the research community and the industrial/consumer community. </P> <P class=body></P> <P> <B>Keywords:</B><BR></P><SPAN class=text_titles_small> <UL> <LI style=″FONT–WEIGHT: bold; WIDTH: 368px″>Smart Devices <UL> <LI>Biometrics, National ID cards <LI>Embedded Systems Security and TPMs <LI>Interplay of TPMs and Smart Cards <LI>Mobile Codes Security <LI>Mobile Devices Security <LI>New Applications for Secure RFID Systems <LI>RFID Systems Security <LI>Smart Card Security <LI>Smart Devices Applications <LI>Wireless Sensor Node Security<BR><BR></LI></UL> <LI style=″FONT–WEIGHT: bold″>Convergence: Security Architectures, Protocols, Policies and Management for Mobility <UL> <LI>Critical Infrastructure (e.g. for Medical or Military Applications) Security <LI>Digital Rights Management (DRM) <LI>Distributed Systems and Grid Computing Security <LI>Industrial and Multimedia Applications <LI>Information Assurance and Trust Management <LI>Intrusion Detection and Information Filtering <LI>Localization Systems Security (Tracking of People and Goods) <LI>M2M (Machine to Machine), H2M (Human to Machine) and M2H (Machine to Human) Security <LI>Mobile Commerce Security <LI>Public Administration and Governmental Services <LI>Privacy Enhancing Technologies <LI>Security Models and Architecture <LI>Security Policies (Human–Computer Interaction and Human Behavior Impact) <LI>Security Protocols (for Identification and Authentication, Confidentiality and Privacy, and Integrity) <LI>Security Measurements<BR><BR></LI></UL> <LI style=″FONT–WEIGHT: bold″>Next Generation Networks <UL> <LI>Ad Hoc Networks Security <LI>Delay–Tolerant Network Security <LI>Domestic Network Security <LI>Peer–to–Peer Networks Security <LI>Security Issues in Mobile and Ubiquitous Networks <LI>Security of GSM/GPRS/UMTS Systems <LI>Sensor Networks Security <LI>Vehicular Network Security <LI>Wireless Communication Security: Bluetooth, NFC, WiFi, WiMAX, WiMedia, others</LI></UL></LI></UL><!–– Text: [end] ––><!–– CONTENT ELEMENT, uid:2/text [end] ––></SPAN>
Abbrevation
WISTP
City
Sevilla
Country
Spain
Deadline Paper
Start Date
End Date
Abstract