[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Wireless Security workshop -- advance registration deadline soon [August 31]
Advance registration deadline soon
(visit http://www.crhc.uiuc.edu/~nhv/wise for more information)
---------------------------------------------------------------
Call for Participation
ACM Workshop on Wireless Security (WiSe)
in conjunction with
ACM MobiCom 2002
September 28, 2002
Atlanta, Georgia, U.S.A.
http://www.crhc.uiuc.edu/~nhv/wise
Sponsored by ACM SIGMOBILE
A workshop on wireless security will be held in conjunction with
ACM MobiCom 2002. The objective of this workshop is to bring together
researchers from research communities in wireless networking,
security, and dependability, with the goal of fostering interaction among
them. With the increasing reliance on wireless networks, issues related to
secure and dependable operation of such networks are gaining importance.
For registration information, please visit http://www.crhc.uiuc.edu/~nhv/wise
Preliminary Program
--------------------------------------------------------------------------------
Paper Session 1 (8:30 - 10:00 a.m.)
Session Chair: David B. Johnson (Rice University)
Securing Ad-Hoc Routing Protocols,
Manel Guerrero Zapata and N. Asokan (Nokia Research Center, Finland)
Self-Organized Network Layer Security in Mobile Ad Hoc Networks,
Hao Yang, Xiaoqiao Meng and Songwu Lu (University of California at Los
Angeles)
An On-Demand Secure Routing Protocol Resilent to Byzantine Failures,
Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru
and Herbert Rubens (Johns Hopkins University)
--------------------------------------------------------------------------------
Poster Session (10:15 - 11:15 a.m.)
Self-Organized Public-Key Management in Ad Hoc Wireless Networks,
S. Capkun, L. Buttyan and J.-P. Hubaux
(Swiss Federal Institute of Technology - Lausanne)
Providing Multi-Layer Security Support for Wireless Communications
Across Multiple Domains,
J. Kong, M. Gerla, R. Gadh, B. S. Prahbu
(University of California, Los Angeles)
Reflection: Secure, Lightweight Wireless Network Administration,
J. W. Mickens, B. D. Noble, A. J. Lanzone, K.-Y. Tye
(University of Michigan, Ann Arbor)
Risk Based Probabilistic Routing for Ad-Hoc Networks,
Z. Yu, T. Jiang, X. Wu and W. A. Arbaugh
(University of Maryland, College Park)
Performance Evaluation of Secure Routing for Mobile Ad Hoc Networks,
P. Papadimitratos and Z. J. Haas (Cornell University)
Security Protocol for Charging and Participation Incentive in Ad Hoc Stub
Network,
B. Lamparter, K. Paul, D. Westhoff (NEC Europe Ltd.)
--------------------------------------------------------------------------------
Invited Presentations (11:15 a.m. - 12:15 p.m.)
Session Chair: Brian Van Leeuwen (Sandia National Laboratories)
Information Assurance and Research Opportunities,
Douglas Maughan, Defence Advanced Research Projects Agency
Perspectives on Wireless Security,
Taieb Znati, National Science Foundation and University of Pittsburgh
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
Paper Session 2 (1:30 - 3:00 p.m.)
Session Chair: Chip Elliott (BBN Technologies)
Survivable Mobile Wireless Networks: Issues, Challenges, and Research
Directions,
Rajesh Krishnan, Regina Rosales Hain, Alden W. Jackson,
David Levin, Ram Ramanathan, John Zao and James P. G. Sterbenz (BBN
Technologies)
Secure Wireless Gateway,
Austin Godber and Partha Dasgupta (Arizona State University)
DoS and Authentication in Wireless Public Access Networks,
Daniel B. Faria and David R. Cheriton (Stanford University)
--------------------------------------------------------------------------------
Paper Session 3 (3:30 - 5:30 p.m.)
Session Chair: Yair Amir (Johns Hopkins University)
A Distributed Monitoring Mechanism in Wireless Sensor Networks,
Chih-fan Hsin and Mingyan Liu (University of Michigan at Ann Arbor)
Using Signal Processing to Analyze Wireless Data Traffic,
Craig Partridge, David Cousins, Alden W. Jackson, Rajesh Krishnan,
Tushar Saxena, and W. Timothy Strayer (BBN Technologies)
Securing IPv6 Neighor Discovery,
Jari Arkko (Ericsson Research NomadicLab),
Tuomas Aura (Microsoft Research Cambridge), James Kempf (DoCoMoLabs
U.S.A.),
Vesa-Matti Mantyla, Pekka Nikander (Ericsson Research NomadicLab)
and Michael Roe (Microsoft Research Cambridge)
Performance Analysis of Elliptic Curve Cryptography for SSL,
Vipul Gupta, Sumit Gupta, Sheueling Chang
and Douglas Stebila (Sun Microsystems)
--------------------------------------------------------------------------------