Abbrevation
NTMS
City
Paris
Country
France
Deadline Paper
Start Date
End Date
Abstract

NTMS&#8242;2015 aims at fostering advances in the areas of New Technologies,<br>Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS,<br>Network Security and E&#8211;commerce, to mention a few, and provides a<br>dynamic forum for researchers, students and professionals to present<br>their state&#8211;of&#8211;the&#8211;art research and development in these interesting<br>areas&#046;<br>The event will be combined with tutorial sessions and workshops&#046;<br>Tutorials will precede the main program, aiming at the dissemination of<br>mature knowledge and technology advances in the field&#046; Two or more<br>Workshops will immediately follow the main conference, offering the<br>opportunity for a more focused exchange of ideas and presentation of on<br>going research relevant to following tracks (More information and the<br>full call&#8211;for&#8211;papers can be found on the conference web):<br>Track 1 : Mobility &amp; Wireless networks<br>&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;<br>&#8211; Beyond 3G, 4G, LTE, and WiMAX Networks<br>&#8211; Wireless Local Area Networks<br>&#8211; Wireless Personal Area Networks<br>&#8211; Wireless Ad Hoc and Mesh Networks<br>&#8211; Wireless Vehicular Networks<br>&#8211; Cognitive Radio Networks<br>&#8211; Satellite Networks<br>&#8211; Self&#8211;organizing and Re&#8211;configurable Wireless Networks<br>&#8211; Energy Efficient Wireless Sensor Network Solutions<br>&#8211; Wireless MAC Protocols<br>&#8211; Scheduling Techniques for Wireless Networks<br>&#8211; Wireless QoS Routing Algorithms<br>&#8211; Radio Resource Allocation and Management<br>&#8211; Cross&#8211;layer Design and Optimization in Wireless Networks<br>&#8211; Clustering, Topology Control, Coverage and Connectivity<br>&#8211; Cooperation and Relaying in Wireless Networks<br>&#8211; Analysis, Simulation and Performance Evaluation<br>&#8211; Integration of Heterogeneous Mobile, Wireless and Wire&#8211;line Radio<br>Access Networks<br>&#8211; Mobility, Location Management and Handover Techniques for Wireless<br>Mobile Networks<br>&#8211; Multimedia over Wireless and Mobile Systems<br>&#8211; Power&#8211;aware Architectures, Algorithms and Protocols for Wireless and<br>Mobile Networks<br>&#8211; Wireless Services and Middleware Platforms<br>&#8211; Green Radio Communications<br>&#8211; Measurements, Testbeds and Deployment of Wireless Systems<br>Track 2: Security<br>&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;<br>Thematic areas:<br>&#8211; Security engineering&#046; Methodologies, formalisms, modeling, tools,<br>code instrumentation<br>&#8211; Cryptography&#046; Algorithms, protocols, attacks<br>&#8211; Security in distributed systems&#046;<br>&#8211; Cryptographic Hardware and Embedded Systems&#046;<br>&#8211; Light&#8211;weight cryptography&#046;<br>&#8211; Information Hiding&#046;<br>&#8211; Steganography<br>&#8211; Privacy and Anonymity&#046;<br>&#8211; Security assurance&#046; Evaluation, testing, formal proofs, certification&#046;<br>&#8211; Quantum Cryptography and QKD&#046;<br>&#8211; Trusted computing&#046; Analyses and attacks, practical applications&#046;&#046;&#046;<br>&#8211; Surveillance and monitoring&#046; Intrusion detection, monitoring<br>techniques, architectures,&#046;&#046;&#046;<br>&#8211; Infrastructure&#046; Middleware, proxies, PKIs, AAAs, SSO, credentials&#046;&#046;&#046;<br>&#8211; Social and psychological aspects of security&#046; User&#8211;centered security<br>evaluation, perception of security and threats&#046;&#046;&#046;<br>&#8211; Security and usability&#046;<br>Application areas:<br>&#8211; Service Oriented Computing&#046; Platform security, access control,<br>Security of the SOC processes (Negotiation, Orchestration),<br>Identification of services&#046;&#046;&#046;<br>&#8211; Cloud computing&#046; Platform security, data protection, software<br>protection, surveillance and dynamic reaction&#046;<br>&#8211; Ubiquitous computing, pervasive computing and ambient intelligence&#046;<br>Secure system models, development support, dynamic reaction, self&#8211;<br>systems<br>&#8211; Embedded systems&#046; Dynamic replaceability, system security assessment,<br>secure system composition, tampering&#8211;resistance&#046;&#046;&#046;<br>&#8211; Security in system evolution&#046; Design for secure evolution, evolution<br>oriented surveillance, security patches&#046;&#046;&#046;<br>&#8211; Critical infrastructures&#046; Protection architectures, redundancy and<br>replication, scalability issues&#046;&#046;&#046;<br>Track 3: New Technologies &amp; services<br>&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;&#8211;<br>&#8211; New generation Internet, Post IP and IPv6<br>&#8211; NGN architectures, protocols and services management and delivery<br>&#8211; Web 2&#046;0 applications and IMS (IP Multimedia Subsystems)<br>&#8211; Next generation systems &amp; Service&#8211;oriented techniques<br>&#8211; IPTV and content distribution networks<br>&#8211; User&#8211;centric networking and services<br>&#8211; multimedia indexing and retrieval<br>&#8211; Personalized access to media systems<br>&#8211; Context/content&#8211;aware services<br>&#8211; Smart Cities, Homes and E&#8211;Health<br>&#8211; Web Commerce &amp; Services, Data models, Web searching &amp; querying<br>&#8211; Web Mining &amp; Web Semantics<br>&#8211; Web service based Grid computing and P2P computing<br>&#8211; Advanced identification techniques (Biometrics, RFID, etc&#046;)<br>&#8211; Virtualization technologies for grid and parallel computing&#046;<br>&#8211; Interactive media, voice and video, games, immersive applications<br>&#8211; Network virtualization, virtual private networks (VPN), and services<br>&#8211; VoIP protocols and services<br>&#8211; Content&#8211;based networking: caching, distribution, load balancing,<br>resiliency<br>&#8211; Mobile/wireless content distribution<br>&#8211; Flying Ad&#8211;Hoc Networks<br>&#8211; Services and Support for Smart Cities<br>&#8211; Intelligent Traffic Information Services<br>&#8211; Vehicular Networks and Applications<br>