Hilarie Orman, Editor | Robert Bruen, Book Review Editor |
Sven Dietrich, Associate Editor | Editor, Reader's Guide |
Commentary and Opinion
Bob Bruen's review of WI-FOO. The Secrets of Wireless Hacking by Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky
Bob Bruen's review of HARDENING Windows Systems by Roberta Bragg
Bob Bruen's review of Know Your Enemy. 2nd ed. Learning About Security Threats by The Honeynet Project
Review of the 17th IEEE Computer Security Foundations Workshop (Asilomar, CA, June 28-30, 2004) by Jon Millen
NewsBits:
Announcements and correspondence from readers (please contribute!)
Cipher
calls-for-papers
and
calendar
new calls or announcements added since Cipher E60
(the calls-for-papers and the calendar announcements may differ
slightly in content or time of update):
Authors are encouraged to submit both theoretical and practical
results of significance on all aspects of wireless and mobile access
technologies with an emphasis on mobility management and wireless
access.
The scope of this workshop includes, but is not limited, to:
For more info, see http://trust.mindswap.org/trustWorkshop/
This workshop seeks submissions from academia and industry presenting
novel research on all aspects of security for ad hoc and sensor
networks, as well as experimental studies of fielded systems.
Submission of papers based on work-in-progress is encouraged. Topics
of interest include, but are not limited to, the following as they
relate to wireless networks,mobile ad hoc networks, or sensor
networks:
For more info, see http://mollie.engr.uconn.edu/DRM2004/
This workshop solicits papers, both form researchers and
practitioners, dealing with mobile computing and wireless access
technologies, with an emphasis on mobility and location management,
ubiquitous and ad hoc access, awareness, mobile computational ambient
agents, natural interaction and seamless access.
The workshop will include contributed technical papers, invited
papers, panel discussions and tools demonstrations.
For more info, see http://ru1.cti.gr/mobiwac04/
This workshop will bring together researchers from different
communities to examine cutting-edge approaches towards the
establishment of these security, trust, and reputation
infrastructures. The emphasis will be to advance and integrate
security and trust related research from the semantic web, logical
reasoning, grid, agent, peer-to-peer, and web services.
The workshop will include both presentations of research papers and
demonstrations of implemented systems. We envisage a wide variety of
contributions both from the area of traditional security and access
control research as well as from the area of reputation propagation
and social network theory.
Workshop topics include, but are not limited to, the following:
The ongoing shrinking of computing facilities to small and mobile
devices like handhelds, portables or even wearable computers will
enhance an ubiquitous information processing. The basic paradigm of
such a pervasive computing is the combination of strongly
decentralized and distributed computing with the help of diversified
devices allowing for spontaneous connectivity. Computers will become
invisible to the users awareness and exchange of information between
devices will effectively defy users control. The objective of this
conference is to develop new security concepts for complex application
scenarios based on systems like handhelds, phones, smartcards,
RF-chips and smart labels hand in hand with the emerging technology of
ubiquitous and pervasive computing. Particular topics include but are
not limited to methods and technologies concerning:
For more info, please see : http://www.spc-conf.org
Reader's guide to recent security and privacy literature
(last updated March 15, 2002)
Listing of academic positions available by
Cynthia Irvine
Staying in touch....
Changing your email address? Please send updates to cipher@ieee-security.org
IEEE Computer Society's Technical Committee on Security and Privacy
TC home page | TC Officers | |
How to join the TC | TC publications available online | |
TC Publications for sale | Cipher past issues archive | |
IEEE Computer Society | Cipher Privacy Policy |