Security and Privacy of Mobile Devices in Wireless Communication
June 1-3, 2011, Heraklion, Crete, Greece - http://www.wistp.org/

Technical enhancements of mobile network infrastructures and the
availability of powerful mobile devices are rapidly changing the way
in which users interact and communicate in everyday life. These
devices include but not limited to PDAs, mobile phones, smart cards,
wireless sensors, and RFID tags. Among the main common features of
these devices include constraint resources and wireless communications.
WISTP 2011 aims to address the security and privacy issues that are
increasingly exposed by mobile communications and related services,
along with evaluating their impact on individuals, and the society at

The workshop seeks submissions from academia and industry presenting
novel research on all theoretical and practical aspects of security
and privacy of mobile and smart devices, as well as experimental
studies of fielded systems based on wireless communication,
the application of security technology, the implementation of systems,
and lessons learned. We encourage submissions from other communities
such as law and business that present these communities' perspectives
on technological issues. Topics of interest include, but are not
limited to:

* Authentication and access control
* Ad hoc networks security and privacy
* Biometrics, national ID cards
* Data security and privacy
* Digital rights management
* Embedded systems security
* Human and psychological aspects of security
* Identity management
* Information assurance and trust management
* Intrusion detection and information filtering
* Lightweight cryptography
* Mobile and ubiquitous network security
* Mobile codes security
* Mobile commerce security
* Mobile devices security
* Privacy enhancing technologies
* RFID systems security
* Secure self-organization and self-configuration
* Security in location services
* Security metrics
* Security models and architectures
* Security of GSM/GPRS/UMTS systems
* Security and privacy policies
* Security protocols
* Smart card security
* Vehicular network security and privacy
* Wireless communication security and privacy
* Wireless sensor network security and privacy

Paper Submission due: December 15, 2010 (midnight Samoa time) *firm deadline*
Notification to authors: February 5, 2011
Author registration: March 1, 2011
Camera-ready due: March 1, 2011

Submissions must not substantially overlap papers that have been
published or that are simultaneously submitted to a journal or
conference/workshop with proceedings. Each submission should be at
most 16 pages in total in the Springer’s LNCS format
(http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). All
submissions should be anonymous (i.e., no author names/affiliations
and obvious citations). Submissions are to be made to the submission
web site (http://www.wistp.org/submission-details/). Only pdf files
will be accepted. Submissions not meeting these guidelines risk
rejection without consideration of their merits. Accepted papers
will be published by Springer in the Lecture Notes in Computer
Science series (http://www.springeronline.com/lncs), and the
proceedings will be available at the workshop. The camera-ready
version of the accepted papers must follow Springer guidelines (a
Latex source file will be required).

If a submitted paper is mainly the work of a student author, this
paper is eligible for the best student paper award. To participate
in this selection process, please add the word "STUDENT" in the
affiliation field in the submission form.

Authors of accepted papers must guarantee that their papers will be
presented at the workshop. At least one author of each accepted
paper is required to register with the workshop and present the
paper. For authors presenting multiple papers, one normal
registration is valid for up to two papers.


General Chairs
* Ioannis Askoxylakis, FORTH-ICS, Greece
* Demosthenes Ikonomou, ENISA, Greece

Program Chairs
* Jianying Zhou, Institute for Infocomm Research, Singapore
* Claudio Ardagna, Universita' degli Studi di Milano, Italy

Workshop/Panel/Tutorial Chair
* Damien Sauveron, University of Limoges, France

Publicity Chairs
* Cheng-Kang Chu, Institute for Infocomm Research, Singapore
* Sara Foresti, Universita' degli Studi di Milano, Italy

Local Organization
* Theodosia Bitzou, FORTH-ICS, Greece
* Alison Manganas, FORTH-ICS, Greece
* Nikolaos Petroulakis, FORTH-ICS, Greece (Chair)

Program Committee
* Rafael Accorsi, University of Freiburg, Germany
* Vijay Atluri, Rutgers University, USA
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Carlo Blundo, University of Salerno, Italy
* Marco Casassa Mont, HP Labs, UK
* Cheng-Kang Chu, Institute for Infocomm Research, Singapore
* Sabrina De Capitani di Vimercati, Universita' degli Studi di
Milano, Italy
* Xuhua Ding, Singapore Management University, Singapore
* Josep Lluis Ferrer-Gomila, Universidad de las Islas Baleares,
* Sara Foresti, Universita' degli Studi di Milano, Italy
* Bok-Min Goi, Universiti Tunku Abdul Rahman, Malaysia
* Stefanos Gritzalis, University of the Aegean, Greece
* Guofei Gu, Texas A&M University, USA
* Jaap-Henk Hoepman, TNO and Radboud University Nijmegen,
* Yih-Chun Hu, University of Illinois, USA
* Michael Huth, Imperial College London, UK
* Hongxia Jin, IBM Almaden Research Center, USA
* Sokratis Katsikas, University of Piraeus, Greece
* Miroslaw Kutylowski, Wroclaw University of Technology, Poland
* Jin Kwak, Soonchunhyang University, Korea
* Costas Lambrinoudakis, University of the Aegean, Greece
* Peng Liu, Pennsylvania State University, USA
* Javier Lopez, University of Malaga, Spain
* Wenjing Lou, Worcester Polytechnic Institute, USA
* Mark Manulis, Technische Universitat Darmstadt, Germany
* Fabio Martinelli, IIT-CNR, Italy
* Carlos Maziero, Pontifical Catholic University, Brazil
* Chris Mitchell, Royal Holloway University of London, UK
* Katerina Mitrokotsa, EPFL, Switzerland
* Jose Onieva, University of Malaga, Spain
* Ferruh Ozbudak, Middle East Technical University, Turkey
* Stefano Paraboschi, University of Bergamo, Italy
* Gerardo Pelosi, University of Bergamo, Italy
* Raphael Phan, Loughborough University, UK
* Joachim Posegga, University of Passau, Germany
* Jean-Jacques Quisquater, Catholic University of Louvain, Belgium
* Jason Reid, Queensland University of Technology, Australia
* Kui Ren, Illinois Institute of Technology, USA
* Reihaneh Safavi-Naini, University of Calgary, Canada
* Kouichi Sakurai, Kyushu University, Japan
* Gokay Saldamli, Bogazici University, Turkey
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Jose Maria Sierra, Carlos III University of Madrid, Spain
* Miguel Soriano, Technical University of Catalonia, Spain
* Willy Susilo, University of Wollongong, Australia
* Tsuyoshi Takagi, Kyushu University, Japan
* Michael Tunstall, University of Bristol, UK
* Wen-Guey Tzeng, National Chiao Tung University, Taiwan
* Jian Weng, Jinan University, China
* Chunxiang Xu, University of Electronic Science and Technology
of China, China
* Chan Yeob Yeun, Khalifa University of Science, Technology &
Research, UAE
* Heung-Youl Youm, Soonchunhyang University, Korea

WISTP Steering Committee
* Angelos Bilas, FORTH-ICS & University of Crete, Greece
* Konstantinos Markantonakis, Royal Holloway University of London, UK
* Jean-Jacques Quisquater, Catholic University of Louvain, Belgium
* Pierangela Samarati, Universita' degli Studi di Milano, Italy
* Damien Sauveron, University of Limoges, France
* Michael Tunstall, University of Bristol, UK

* IFIP WG 11.2 Pervasive Systems Security
For further inquiries, please contact Damien Sauveron at

This call for papers and additional information about the conference
can be found at http://www.wistp.org/
Program chairs can be contacted at wistp2011@unimi.it