From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by c5ff346549e7 (Postfix) with ESMTPS id 3681D5D5 for ; Fri, 15 Nov 2019 15:45:51 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.68,308,1569276000"; d="scan'208,217";a="412001075" Received: from sympa.inria.fr ([193.51.193.213]) by mail2-relais-roc.national.inria.fr with ESMTP; 15 Nov 2019 16:45:49 +0100 Received: by sympa.inria.fr (Postfix, from userid 20132) id AAEF27F39D; Fri, 15 Nov 2019 16:45:48 +0100 (CET) Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id 2A3C27F30F for ; Fri, 15 Nov 2019 16:43:20 +0100 (CET) Authentication-Results: mail3-smtp-sop.national.inria.fr; spf=None smtp.pra=mobilenetwork.chapter@gmail.com; spf=Pass smtp.mailfrom=mobilenetwork.chapter@gmail.com; spf=None smtp.helo=postmaster@mail-lf1-f65.google.com IronPort-PHdr: =?us-ascii?q?9a23=3ABf47OREEiR0wkYKHSw9WUp1GYnF86YWxBRYc798d?= =?us-ascii?q?s5kLTJ7zrs2wAkXT6L1XgUPTWs2DsrQY0rGQ6vu9EjNQqb+681k6OKRWUBEEjc?= =?us-ascii?q?hE1ycBO+WiTXPBEfjxciYhF95DXlI2t1uyMExSBdqsLwaK+i764jEdAAjwOhRo?= =?us-ascii?q?LerpBIHSk9631+ev8JHPfglEnjWwba58IRmssAncuMkbjYRgJ6sy1xDEvmZGd+?= =?us-ascii?q?NKyG1yOFmdhQz85sC+/J5i9yRfpfcs/NNeXKv5Yqo1U6VWACwpPG4p6sLrswLD?= =?us-ascii?q?TRaU6XsHTmoWiBtIDBPb4xz8Q5z8rzH1tut52CmdIM32UbU5Uims4qt3VBPljj?= =?us-ascii?q?oMODkl/WzZlsB8kbtXrA68qxdix4LYfYGYOP94c6jAf90VWHBBU95eWCJBDI2y?= =?us-ascii?q?bJYBAfQdMutFtITyvUcCoAGkCAWwGO/iyDlFjWL2060g1OQhFBnL0RInH9IIvn?= =?us-ascii?q?Tbss/1O7kUUe+p0qbD0CvOYfNM1zzg74XIdxchruqNXbJ0b8XRz1cgFx/Lj1WX?= =?us-ascii?q?s4zlPCmZ2fgNs2eB9+pgSfygi3Q8pgF+pzig3MYsio3Tio0JzVDE8Dx0zYAoLt?= =?us-ascii?q?O2T057ZMSrEJpWtyyCNIt5XNktQ2BwuCYn0bIGvZ+7fDMKyJQmwR7fZOaLfJSP?= =?us-ascii?q?4hLmTOqePyl4hHN+eL2hnRq97U+gyuj6W8Kp01hKtjJInsfQun0JzRDe6ciKRu?= =?us-ascii?q?Fg8kqg2zuDzQHe5+FCLEspj6TUMYQhzaQ1lpcLsUTMACv2mELuga+TbEok++yo?= =?us-ascii?q?5/3jYrXou5OQLoF0hwD+P6g0lcy/BuM4MgcKX2eF4+izyLrj/UjhTLVLiP05jL?= =?us-ascii?q?XZvYjEKcgHoqO1GQxY34Y55xqiDjqr0s4UkHgHIV5dfRKIlYnpO1XAIPDiCve/?= =?us-ascii?q?hkyhkDJsx//dP73hBovCLn7dn7f9c7d97FRcyAkpwd9D55JbEKkBIO7tVU/rr9?= =?us-ascii?q?HYARo5PBa1w+bjEtlyyoQeWWeXDq+DLKzSqUOI5v4oI+SUeIAaojP9K/w86/7q?= =?us-ascii?q?jH85gkMdcLKy3ZoXbXC4Bu5pL1+YYXrqmNcBEH0FshAwTOzw2xW+Vmt2anC9F5?= =?us-ascii?q?0OrmU+D4inCYrFS5yyh6aCmiy7F4VKa3puBVWFEHOufIKBDaQiciWXd+RmlDIJ?= =?us-ascii?q?T7WnQIJp/j+W/Fv/zLBmKufS9zEHsojgktN17vXPmAsa+jl9DsDb2GaIGTIn1l?= =?us-ascii?q?gUTiM7ifgs6Xd2zU2OhPEl2q0KJZlo//pMFzwCG9vZxu1+Bcr1X1uYLNiMQVei?= =?us-ascii?q?BN6hBGNoF49j85o1e094Xu6aoFXD0i6tWeJHkrWKANkw/PuZ0SasYcl6zHnC2e?= =?us-ascii?q?8qiFx0GpITZ13jvbZ28k3oP6CMi1+Qzv/4eqEV3SqL/2CGnzKD?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CYBgAox85dZ0GnVdFkHAEBAQEBBwEBE?= =?us-ascii?q?QEEBAEBgW0EAQELAYEbUzEoRIEHFhSEKYEcgl6KdRuLdneIQYgLCQEDAQwFIAo?= =?us-ascii?q?BAYRATgEEgVIcBwEEMwYOAg4BAQQBAQECAQIDBAETCwsLBimFFAEBBAIkDIIpE?= =?us-ascii?q?gyDIxEdARseAxIQIwETAiQBEQEFASIsAgeDAYJFAQMJJQ+gV4IcgQM9iyWBFQU?= =?us-ascii?q?BF4J/BYFMD4J4ChknDWaBPAIHEoEkAYtuJoIXgRGCZINOAQOBOFQbAoJGgl4Ej?= =?us-ascii?q?QWKGJcIB4ItkEiCRoI/G5oOqGkPI4FFgUkeDAhwgQGCBwEBMglHERRXhQyBDYh?= =?us-ascii?q?FgWWDc4pgNzAJjx0CDReCGgEB?= X-IPAS-Result: =?us-ascii?q?A0CYBgAox85dZ0GnVdFkHAEBAQEBBwEBEQEEBAEBgW0EAQE?= =?us-ascii?q?LAYEbUzEoRIEHFhSEKYEcgl6KdRuLdneIQYgLCQEDAQwFIAoBAYRATgEEgVIcB?= =?us-ascii?q?wEEMwYOAg4BAQQBAQECAQIDBAETCwsLBimFFAEBBAIkDIIpEgyDIxEdARseAxI?= =?us-ascii?q?QIwETAiQBEQEFASIsAgeDAYJFAQMJJQ+gV4IcgQM9iyWBFQUBF4J/BYFMD4J4C?= =?us-ascii?q?hknDWaBPAIHEoEkAYtuJoIXgRGCZINOAQOBOFQbAoJGgl4EjQWKGJcIB4ItkEi?= =?us-ascii?q?CRoI/G5oOqGkPI4FFgUkeDAhwgQGCBwEBMglHERRXhQyBDYhFgWWDc4pgNzAJj?= =?us-ascii?q?x0CDReCGgEB?= X-IronPort-AV: E=Sophos;i="5.68,308,1569276000"; d="scan'208,217";a="326873522" X-MGA-submission: =?us-ascii?q?MDE+JMMBsUmsxEFhj5TBzh3bk+Lni8bNspoUgH?= =?us-ascii?q?pgavVTyfytiW1tMBWapuVOi6ia9TqSFiOgRkH8tDDtj5dpvc/R1Nlv7d?= =?us-ascii?q?evQyJEJKIWlw0pbeKVrBrCuh/ZTo3p3+298F34zdAgiMl1CK4u9qXEE8?= =?us-ascii?q?rmll5o+pq7YMwgxzYk8PPIww=3D=3D?= Received: from mail-lf1-f65.google.com ([209.85.167.65]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/AES128-GCM-SHA256; 15 Nov 2019 16:43:19 +0100 Received: by mail-lf1-f65.google.com with SMTP id v8so8321919lfa.12 for ; Fri, 15 Nov 2019 07:43:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=8qLqpwV2P6lP4qTURxL1zk89AXx3rQTHN3p8Ame+ptY=; b=sWqYw4eOLMECM1If5a4s0lve/9CafpHqjKqXrxw1V8LXkcxiRGtNUiOcQQwFXv1mo4 6zlUxOeu52wL035UOH447xOs8kqFRlUGvzrkWtRBWUKJpKt7p3PzDCPgsurmePiwIVe7 zR5UnnasD4u0icSxVvEIXLc6Bk7ezk03ZYEO8FO/LbE2jDEb/4DJrNuy8F3I1DRID1fe wWSADO7lpvucuxy69gBSP4zrjtqkW5vYfcTxzuifJaHgw7NYWoHWNQXqiA7j+oBc587U tcgd+cOzRqY2JeTvrgC8oNJl021Ru3VG0xOQWG+1Y0q/9eqE49yPs4V1Ac2CjPy/auAU sUfw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=8qLqpwV2P6lP4qTURxL1zk89AXx3rQTHN3p8Ame+ptY=; b=K65ZADL2sC/R/Rab+2ZrXPREXwjfdSPa8HehJuOBPR/s/tIg4oF7L0syrSvqt9Ikpy xbJs9gW1572WkywW1hdOk0fkexJmyVewXX2bK5AnHIt8o0dm7KtEd2Zw7PJrY0Yf9SR0 MS3k3JEc/1ltbg1NfRkk0Z4vDURFKyEfu0fIuZpyjA4bZXPU5Y+s4uzXq3YwJ3/fimPM UafvwJRUqFgdw5HJxk7OazTuy2gNC9Lnzyg0UGFRDTrRBkxoBmbFDcmM8lxP7iXj8HUA ZyeALytVsY1O1L74HKFDMdn9Vyp8auQBMR3E8g77VvCuoKRkyLuWixm7StV50BsRdO0Q EmpA== X-Gm-Message-State: APjAAAUBuWWCpvSxe1nrzGYSKOsIPKLbYSCN6EQh4j4A+4NPyTkH870Z 8hOu4U5OtdpNP2DhGN1XBgsEyTmxyfljB7R3SYodUiqU X-Google-Smtp-Source: APXvYqwVPXnU0Xz13iRnC8EolzFmM631hbNmyc+t79tQCEFbtmniiZLX9dVuqWi2mmASOgNfbfAck0H1Tdr3ldt725A= X-Received: by 2002:ac2:4c16:: with SMTP id t22mr11600456lfq.124.1573832598072; Fri, 15 Nov 2019 07:43:18 -0800 (PST) MIME-Version: 1.0 From: Conference CFP Date: Fri, 15 Nov 2019 23:43:07 +0800 Message-ID: To: Meng WZ Content-Type: multipart/alternative; boundary="000000000000f1b181059764742a" X-Validation-by: mobilenetwork.chapter@gmail.com Subject: [Caml-list] DCN Special Issue on Security and Privacy Protection in the Era of IoT Devices Reply-To: Conference CFP X-Loop: caml-list@inria.fr X-Sequence: 17875 Errors-to: caml-list-owner@inria.fr Precedence: list Precedence: bulk Sender: caml-list-request@inria.fr X-no-archive: yes List-Id: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: --000000000000f1b181059764742a Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable IoT devices like smartphones have become an important personal assistant and an indispensable part of our everyday life and work. With more and more users storing their private data on phones, it becomes greatly important to develop secure mobile operating systems, secure mobile cloud and applications, and secure mobile devices. In recent years, IoT device security like smartphone security depends not only on the phones, but also on the mobile device management technology that controls and manages device security. As a result, there is an increasing need for secure solutions to protect users' sensitive and private information in the IoT environment. This special issue will focus on IoT device security and privacy issues, and aims to bring together research contributions of unpublished research on the recent development and innovations about the technologies to protect mobile security and privacy. Potential topics, but are not limited to: The goal of this special issue is to collect high-quality contributions to address the human-centric challenges and solutions for IoT device security and privacy. Topics of interest include, but are not limited to the ones listed below. - Adversarial modeling - Vulnerability Assessment and testing - Intrusion detection and prevention schemes - Mobile and cloud device and applications management - Impact of human social behavior on mobile usage - Secure routing and access control - Mobile device management challenges - Digital forensics on mobile operating systems, applications and smartphones - Secure mobile application development - Mobile and cloud application security and digital forensics - Mobile and cloud user authentication and authorization - Multi-factor mobile and cloud authentication - Mobile and cloud user privacy - Blockchain technology - Big data mining - Advance persistent threats - Biometric security and privacy Important Dates - Submission deadline: 30 December 2019 - Initial notification: 30 February 2020 - Final acceptance/rejection notification: 15 May 2020 Guest Editors - Dr. Weizhi Meng,Technical University of Denmark, Denmark - Dr. Daniel Xiapu Luo, Hong Kong Polytechnic University, China - Dr. Chunhua Su, University of Aizu, Japan - Prof. Debiao He, Wuhan University, China - Dr. Marios Anagnostopoulos, Norwegian University of Science and Technology, Norway - Dr. Qian Chen, University of Texas at San Antonio, USA Submission Guidelines Authors should prepare their manuscript according to =E2=80=9CGuide for Aut= hors=E2=80=9D at http://www.keaipublishing.com/en/journals/digital-communications-and-networ= ks/guide-for-authors/ and submit their manuscripts through the Manuscript Tracking System at https://www.evise.com/profile/#/DCAN/login = =E3=80=82All papers will be peer-reviewed by at least three independent reviewers. Requests for additional information should be addressed to the Corresponding Guest Editor. --000000000000f1b181059764742a Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable

Io= T devices like smartphones have become an important personal assistant and = an indispensable part of our everyday life and work. With more and more use= rs storing their private data on phones, it becomes greatly important to de= velop secure mobile operating systems, secure mobile cloud and applications= , and secure mobile devices. In recent years, IoT device security like smar= tphone security depends not only on the phones, but also on the mobile devi= ce management technology that controls and manages device security. As a re= sult, there is an increasing need for secure solutions to protect users'= ; sensitive and private information in the IoT environment.

This special issue will focus on IoT device security and pr= ivacy issues, and aims to bring together research contributions of unpublis= hed research on the recent development and innovations about the technologi= es to protect mobile security and privacy.=C2=A0

Poten= tial topics, but are not limited to:

The goa= l of this special issue is to collect high-quality contributions to address= the human-centric challenges and solutions for IoT device security and pri= vacy. Topics of interest include, but are not limited to the ones listed be= low.

  • Adversarial modeling
  • Vulnerability Assessment and tes= ting
  • Intrusion detection and prevention schemes=C2=A0
  • Mobil= e and cloud device and applications management
  • Impact of human soci= al behavior on mobile usage
  • Secure routing and access control=C2=A0=
  • Mobile device management challenges
  • Digital forensics on m= obile operating systems, applications and smartphones
  • Secure mobile= application development
  • Mobile and cloud application security and = digital forensics
  • Mobile and cloud user authentication and authoriz= ation
  • Multi-factor mobile and cloud authentication
  • Mobile a= nd cloud user privacy
  • Blockchain technology
  • Big data mining=
  • Advance persistent threats
  • Biometric security and privacy<= /li>

Important Dates

  • Submission deadline: 30 December = 2019
  • Initial notification: 30 February 2020
  • Final acceptanc= e/rejection notification: 15 May 2020

Guest Editors

  • Dr. Weizhi Me= ng,Technical University of Denmark, Denmark
  • Dr. Daniel Xiapu Luo,= =C2=A0Hong Kong Polytechnic University, China
  • Dr. Chunhua Su,=C2=A0= University of Aizu, Japan
  • Prof. Debiao He,=C2=A0Wuhan University, C= hina
  • Dr. Marios Anagnostopoulos,=C2=A0Norwegian University of Scien= ce and Technology, Norway
  • Dr. Qian Chen,=C2=A0University of Texas a= t San Antonio, USA

Submission Guidelines

Authors s= hould prepare their manuscript according to =E2=80=9CGuide for Authors=E2= =80=9D at=C2=A0http://www.keaipublishing.com/en/journals/di= gital-communications-and-networks/guide-for-authors/=C2=A0and submit th= eir manuscripts through the Manuscript Tracking System at=C2=A0https://www.evise.com/p= rofile/#/DCAN/login=E3=80=82<= /span>All papers will be peer-reviewed by at least three independent review= ers. Requests for additional information should be addressed to the Corresp= onding Guest Editor.

--000000000000f1b181059764742a--