Conference Information
WiSec 2015 : ACM Conference on Security and Privacy in Wireless and Mobile Networks
Submission Date:
Notification Date:
Conference Date:
New York City, New York, USA
CCF: c   QUALIS: b1   Viewed: 3245   Tracked: 1   Attend: 1

Conference Location
Call For Papers
ACM WiSec 2015 will run from June 22 to June 26, 2015. It will be co-located with RFIDSec'15 in New York City, US.

ACM WiSec is the leading ACM and SIGSAC conference dedicated to all aspects of security and privacy in wireless and mobile and mobile networks and their applications. In addition to the traditional ACM WiSec topics of physical, link, and network layer security, we welcome papers focusing on the security and privacy of mobile software platforms, usable security and privacy, biometrics, cryptography, and the increasingly diverse range of mobile or wireless applications such as Internet of Things, and Cyber-Physical Systems. The conference welcomes both theoretical as well as systems contributions.

Topics of interest include:

    Mobile malware and platform security
    Security & Privacy for Smart Devices (e.g., Smartphones)
    Wireless and mobile privacy and anonymity
    Secure localization and location privacy
    Cellular network fraud and security
    Jamming attacks and defenses
    Key extraction, agreement, or distribution
    Theoretical foundations, cryptographic primitives, and formal methods
    NFC and smart payment applications
    Security and privacy for mobile sensing systems
    Wireless or mobile security and privacy in health, automotive, avionics, or smart grid applications
    Self-tracking/Quantified Self Security and Privacy
    Physical Tracking Security and Privacy
    Usable Mobile Security and Privacy
    Economics of Mobile Security and Privacy
    Bring Your Own Device (BYOD) Security

The proceedings of ACM WiSec will be published by the ACM.

Full and short papers

Full paper submissions to ACM WiSec 2015 can be up to 10 pages in the ACM conference style excluding the bibliography and well marked appendices, and up to 12 pages in total. ACM WiSec also encourages the submission of short papers with a length of up to 6 pages, which describe mature work of a more succinct nature. All papers must be thoroughly anonymized for double-blind reviewing. Detailed submission instructions will appear on the conference website here. 
Last updated by Dou Sun in 2014-11-08
Related Publications
Acceptance Ratio
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ADCSAustralasian Document Computing Symposium2014-09-292014-10-132014-11-27
bb4WAOAWorkshop on Approximation and Online Algorithms 2012-07-302012-09-13
cTAPIARichard Tapia Celebration of Diversity in Computing Conference2014-08-08 2015-02-18
PPSIAM Conference on Parallel Processing and Scientific Computing2013-08-22 2014-02-18
ab1WGInternational Workshop on Graph-Theoretic Concepts in Computer Science 2013-04-302013-06-19
ca2CODES+ISSSInternational Conference on Hardware/Software Codesign and System Synthesis2014-04-182014-06-272014-10-12
ccb1MMMInternational Conference on MultiMedia Modeling2014-08-152014-09-192015-01-05
cb1MobiquitousInternational Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services2015-03-092015-04-302015-07-22
BlackSeaComInternational Black Sea Conference on Communications and Networking2015-01-312015-03-152015-05-18
SIAInternational Conference on Sensor and Its Applications2014-06-102014-06-202014-07-09
Related Journals
CCFFull NameImpact FactorPublisherISSN
cWireless Networks0.958Springer1022-0038
International Journal of Wireless and Mobile Networking AR Publication2347-9078
International Journal of Wireless & Mobile Networks AIRCC0975-4679
cJournal of Internet Security DDSecure.Net Inc.1206-4890
International Journal of Network Security & Its Applications AIRCC0975-2307
cMobile Networks & Applications0.683Springer1383-469X
Mobile Networks and Applications1.109Springer1383-469X
cNetworking Science Springer2076-0310
bComputers & Security0.889ELSEVIER0167-4048
aIEEE Transactions on Information Forensics and Security1.826IEEE1556-6013
comments powered by Disqus