MobiSec's focus is the convergence of information and communication technology in mobile scenarios. This convergence is realised in intelligent mobile devices, accompanied by the advent of next-generation communication networks. Privacy and security aspects need to be covered at all layers of mobile networks, from mobile devices, to privacy-respecting credentials and mobile identity management, up to machine-to-machine communications.
In particular, mobile devices such as Smartphones and Internet Tablets have been very successful in commercialization. However, their security mechanisms are not always able to deal with the growing trend of information-stealing attacks.
As mobile communication and information processing becomes a commodity, economy and society require protection of this precious resource. Mobility and trust in networking go hand in hand for future generations of users, who need privacy and security at all layers of technology. In addition, the introduction of new data collection practices and data-flows (e.g. sensing data) from the mobile device makes it more difficult to understand the new security and privacy threats introduced.
MobiSec strives to bring together the leading-edge of academia and industry in mobile systems security, as well as practitioners, standards developers and policymakers. Contributions may range from architecture designs and implementations to cryptographic solutions for mobile and resource-constrained devices.
Technical papers describing original, previously unpublished research, not currently under review by another conference or journal, are solicited. MobiSec solicits original, high-quality research contributions in the form of full papers. The focus is on the security of information and communication systems including mobile networks, devices and applications. Papers from other areas, e.g., formal methods, cryptography, database security, operating system security, will be considered if a clear connection to one of the topics below is demonstrated.
Topics of interest include, but are not limited to, the following focus areas:
Smartphone Security and Privacy:
- Advanced Security & Privacy Mechanisms
- Virtualisation Solutions
- Rogue Mobile Application Detection and Protection
- Forensic Analysis
Machine-to-Machine Secure Communication:
- Device Identities and Authentication
- Remote Integrity Validation and Remediation
- Remote Management and Provisioning
- Machine-to-Machine Application Layer Security
- Secure Elements and Trusted Environments
Privacy and Security in Emerging Mobile Applications and Services:
- Privacy-respecting Authentication
- Mobile Identity Management
- Mobile Wallets, Mobile Payments
- Location-based Services and Mobile Sensing
Panels, Workshops, Tutorials
Proposals for panels/demos/workshops/tutorials are solicited. Potential organisers are welcome to submit a proposal to one of the general chairs or the Workshops or Panels chair.
Paper submission will be handled electronically. Authors should prepare an Adobe Acrobat PDF version of their full paper. All submitted papers will be subject to a rigorous peer-review. Papers must be formatted using Springer LNICST Authors' Kit (http://mobisec.org/2012/show/authors-kit) and submitted only through the EasyChair conference management system (https://www.easychair.org/conferences/?conf=mobisec2012).
Papers must not exceed the limit of 12 pages, for short papers 6 pages, including text, figures and references. The font size must be at least 10 points.
Accepted papers will be published in the MobiSec Conference Proceedings and by Springer-Verlag in the Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Tele-communications Engineering (LNICST) series. The proceedings will be available both as paper-based copies and via Springerlink, Springer's digital library. In addition, the content of the proceedings will be reviewed by various indexing services such as the DBLP database, ZBlMath/CompuServe, MATHSCINET, EI-INSPEC, IET, RPS, Computer Science Bibliography Administrator, Elsevier Bibliographic Databases Source Management, ULRICH, CSA, ProQuest. Selected high-quality papers will be invited to a Special Issue in the Journal ‚Security and Communication Networks’ (SCN, Wiley; to be confirmed)