Abbrevation
NTMS
City
Tangier
Country
Morocco
Deadline Paper
Start Date
End Date
Abstract

<P><FONT size=2>NTMS’2008 is the second International Conference on New Technologies, Mobility and Security that will be held from 5 to 7 November, 2008 in TANGIER, MOROCCO&#046; NTMS&#8242;2008 conference is technically co&#8211;sponsored by IFIP and IEEE Morocco&#046; </FONT></P> <P><B>Keywords:</B> </P> <P><B><FONT size=2>Design and analysis of Mobile/Wireless Networks and Systems :</FONT></B></P> <UL> <LI><FONT size=2>Mobile 3G, 4G, LTE (Long Term Evolution), convergence (IMS, …)</FONT> <LI><FONT size=2>Wireless Personal Area Networks and Wireless Local Area Networks (Wi&#8211;Fi, &#046;&#046;&#046;) </FONT> <LI><FONT size=2>Ad Hoc networking, Sensor networks, Self&#8211;organizing mesh networks and autonomic systems • Wireless Mesh Networks, Metropolitan Area Networks &amp; regional area networks (WiMAX/802&#046;16, 802&#046;16e, WiMAXphase 2, WiBro, WiRAN) </FONT> <LI><FONT size=2>Optical networks and switching (new generation SDH, OTN) </FONT> <LI><FONT size=2>Satellite Systems </FONT> <LI><FONT size=2>Vehicular Communication Technologies and Systems </FONT> <LI><FONT size=2>Mobility management and Handover </FONT> <LI><FONT size=2>Medium Access Control &amp; Scheduling Techniques for Wireless Systems </FONT> <LI><FONT size=2>Quality of Service provisioning </FONT> <LI><FONT size=2>Resource allocation management </FONT> <LI><FONT size=2>Performance evaluation </FONT> <LI><FONT size=2>Cross&#8211;layer network design and optimization </FONT> <LI><FONT size=2>Security </FONT> <LI><FONT size=2>Cognitive radio and smart antenna </FONT> <LI><FONT size=2>Testbed experiments, Mobile/Wireless Applications and Services</FONT> </LI></UL> <P> <B><FONT size=2>Security</FONT></B> :</P> <UL> <LI><FONT size=2>Network security, vulnerability, authentication and access control </FONT> <LI><FONT size=2>Network fault&#8211;tolerance &amp; reliability, debugging &amp; troubleshooting </FONT> <LI><FONT size=2>Confidentiality, Data and system integrity </FONT> <LI><FONT size=2>Intrusion Detection, Prediction, and Countermeasures </FONT> <LI><FONT size=2>Identity management and Trust management </FONT> <LI><FONT size=2>Privacy, contract agreements, and payment systems </FONT> <LI><FONT size=2>Key Distribution and management, Public key infrastructure implementation </FONT> <LI><FONT size=2>Mobile code security </FONT> <LI><FONT size=2>Security and mobility management </FONT> <LI><FONT size=2>Web, e&#8211;mail , m&#8211;commerce, e&#8211;business and e&#8211;commerce security </FONT> <LI><FONT size=2>Testbeds, performance evaluation and formal specification methods </FONT> <LI><FONT size=2>Virtualization for security and reliability </FONT></LI></UL> <P><B><FONT size=2>New Technologies &amp; services :</FONT></B></P> <UL> <LI><FONT size=2>Analysis</FONT><FONT size=2> and design of new generation systems (network architectures, protocols, network management, traffic engineering, resource management, quality of service, signalling &amp; scheduling, …) </FONT> <LI><FONT size=2>New generation internet, Post IP and IPv6, Carrier Grade networks, xDSL and FTTx, Power Line Communication </FONT> <LI><FONT size=2>Peer&#8211;to&#8211;peer</FONT><FONT size=2>, overlay, and content distribution networks </FONT> <LI><FONT size=2>Pervasive</FONT><FONT size=2>, Ubiquitous and Mobile Computing </FONT> <LI><FONT size=2>Agents and Middlewares, Agent Computing and Agent Applications </FONT> <LI><FONT size=2>Grid</FONT><FONT size=2> and cluster computing &amp; Context aware computing </FONT> <LI><FONT size=2>Adaptation software development </FONT> <LI><FONT size=2>Component based software engineering &amp;Software verification &amp; analysis </FONT> <LI><FONT size=2>Web Commerce &amp; Services, Data models, Web searching &amp; querying </FONT> <LI><FONT size=2>Data Mining , XML, Query Processing &amp; Optimization, Storage Structures &amp; Indexing </FONT> <LI><FONT size=2>Web Mining &amp; Web Semantics </FONT> <LI><FONT size=2> Web service based Grid computing and P2P computing Web services </FONT> <LI><FONT size=2>Quantum Cryptography systems </FONT> <LI><FONT size=2>Biometric</FONT><FONT size=2> systems </FONT> <LI><FONT size=2>Virtualization</FONT><FONT size=2> of systems, networks and protocols </FONT> <LI><FONT size=2>Virtualization</FONT><FONT size=2> technologies for grid and parallel computing </FONT></LI></UL>