[Mip4] NTMS 2015 - Deadline Submission reminder (March 1, 2015)

Mohamad Badra <mbadra@gmail.com> Mon, 23 February 2015 13:22 UTC

Return-Path: <mbadra@gmail.com>
X-Original-To: mip4@ietfa.amsl.com
Delivered-To: mip4@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF7361A1AE8 for <mip4@ietfa.amsl.com>; Mon, 23 Feb 2015 05:22:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 4.489
X-Spam-Level: ****
X-Spam-Status: No, score=4.489 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MALFORMED_FREEMAIL=2.767, MISSING_HEADERS=1.021, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c5pwSdYtgUT2 for <mip4@ietfa.amsl.com>; Mon, 23 Feb 2015 05:22:06 -0800 (PST)
Received: from mail-wi0-x236.google.com (mail-wi0-x236.google.com [IPv6:2a00:1450:400c:c05::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A83D1A1AE6 for <mip4@ietf.org>; Mon, 23 Feb 2015 05:22:05 -0800 (PST)
Received: by mail-wi0-f182.google.com with SMTP id l15so16669724wiw.3 for <mip4@ietf.org>; Mon, 23 Feb 2015 05:22:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:cc:content-type; bh=XoZWSBQvpjGL5p9t/hXFSLBHR8G7sGDvNvBitan+9KQ=; b=X+Twx0REmsUOlvh1BZ0A0SzwiWBHaDad8atjUiOq+VNOoV6McGFe7+IJg0hHLRr/km 81rxIJ1piVuWe4WkolBy3JcK82+15pyokbv7F3YMeOFig9a4+6OdT5DVGu+Lkh8hyI9N 34RLXiqCnJwtWCdZZgvtEsQqWoyQGAXIhB9pjX0Dr7P4VjtSdcHT2z0fPO2ohpT/mVHb oVR9BqYwrbsX3mvp3yQY4NiWFj+f34P9UoFF66TYW3vMjya5ux8VVHfc2rRWyXKpTr5C He+5FirMm43LFeZ1c9wGrdMvLUMf3zuMLpZr0Wgp/PMHWlZhP+ffXOD4kPkeoFX5DxKh FRfA==
MIME-Version: 1.0
X-Received: by 10.194.92.9 with SMTP id ci9mt13028051wjb.142.1424697724205; Mon, 23 Feb 2015 05:22:04 -0800 (PST)
Received: by 10.27.84.148 with HTTP; Mon, 23 Feb 2015 05:22:04 -0800 (PST)
Date: Mon, 23 Feb 2015 17:22:04 +0400
Message-ID: <CAOhHAXy5yrHRYdcd2qFMw90uC7p7BXWUmuBRZ99x2q0o0+4U7g@mail.gmail.com>
From: Mohamad Badra <mbadra@gmail.com>
Content-Type: multipart/alternative; boundary="047d7bfcf814c5b1e1050fc14946"
Archived-At: <http://mailarchive.ietf.org/arch/msg/mip4/npE0Iw010OnOqgux19Xs_LEqXU4>
X-Mailman-Approved-At: Mon, 23 Feb 2015 14:06:10 -0800
Cc: sif-forum@polytech.unice.fr, stcos-announce@ieee.net, cfp@grid.chu.edu.tw, listserv@acm.org, publicity@hipeac.net, sbac-l@sbc.org.br, alg-prog-l@sbc.org.br, mip4@ietf.org, compass@kncpc.re.kr, chi-announcements@listserv.acm.org, sbc-l@sbc.org.br, dconf@dline.info, ifip-tc11 <ifip-tc11@dlist.uni-frankfurt.de>, asr-forum@cines.fr, eii-associate-owner@lists.eii.edu.au, dbitaly@list.dia.uniroma3.it, hpc-announce@mcs.anl.gov, tc-comswtc@comsoc.org, mycolleagues@mailman.ufsc.br, ubicomp-announcements@comp.lancs.ac.uk, ias-opportunities@cerias.purdue.edu, listserv@lists.utwente.nl, tcos-announce@www.fsl.cs.sunysb.edu, wk@worldkorean.net, seg-l@sbc.org.br, associate@eii.edu.au, announcements@ubicomp.org, pmcs-manager@vip.sina.com, conferences@gridtoday.com, tcpp-announce@cc.gatech.edu, resd-l@sbc.org.br, dsfsa@aol.com, om-announce@openmath.org, cfp@papersinvited.com, members@eii.edu.au, authors@inf.ufsc.br, cipher-cfp@ieee-security.org, ukubinet-announce@doc.ic.ac.uk, gdrssi@univ-pau.fr, sympa@lists.ens.fr, comm-theory@ieee.org, ifip_nm@lists.utwente.nl, cscw-sig@jiscmail.ac.uk, contact@giecongress.com, p_d-l@sbc.org.br, sigmm@pi4.informatik.uni-mannheim.de, SECURITY@fosad.org, TCBDPAN@comsoc-listserv.ieee.org, membres@sigops-france.fr, see-sic-request@laas.fr, ukubinet-announce@imperial.ac.uk, distributed-computing-announce@datasys.cs.iit.edu, tfsbc-l@sbc.org.br, Carlos Becker Westphall <westphal@inf.ufsc.br>, sbc-si-l@sbc.org.br, exec-education-news@nus.edu.sg, types-announce@lists.seas.upenn.edu, fmindia@cmi.ac.in, pervasive@pervasive.jku.at, elsnet-list@list.hum.uu.nl, petrinet@mailhost.informatik.uni-hamburg.de, ifip113@unimi.it, policy-sig@doc.ic.ac.uk, etep@epic.or.kr, gtnet@kisti.re.kr, IRList@lists.shef.ac.uk, semanticweb@egroups.com, ietf-announce@ietf.org, mycolleagues@grid.lrg.ufsc.br
Subject: [Mip4] NTMS 2015 - Deadline Submission reminder (March 1, 2015)
X-BeenThere: mip4@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Mobility for IPv4 <mip4.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mip4>, <mailto:mip4-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mip4/>
List-Post: <mailto:mip4@ietf.org>
List-Help: <mailto:mip4-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mip4>, <mailto:mip4-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Feb 2015 13:22:09 -0000

(Our apologies if you receive multiple copies of this CFP)

             Seventh IFIP International Conference on
              New Technologies, Mobility and Security
                  27-29 July 2015, Paris, France
                      http://www.ntms-conf.org

Technically supported by IEEE, IEEE COMSOC & IFIP TPC6
All accepted papers will be published in IEEE Xplore

Overview
--------------
NTMS'2015 is the Seventh IFIP International Conference on New
Technologies, Mobility and Security that will be held in Paris,
France from 27 to 29 July 2015. NTMS'2015 conference is technically
co-sponsored by IEEE, IEEE COMSOC & IFIP TC6.5 WG.

NTMS'2015 aims at fostering advances in the areas of New
Technologies, Wireless Networks, Mobile Computing, Ad hoc and
Ambient Networks, QoS, Network Security and E-commerce, to mention a
few, and provides a dynamic forum for researchers, students and
professionals to present their state-of-the-art research and
development in these interesting areas.

The event will be combined with tutorial sessions and workshops.
Tutorials will precede the main program, aiming at the dissemination
of mature knowledge and technology advances in the field. Two or
more Workshops will immediately follow the main conference, offering
the opportunity for a more focused exchange of ideas and
presentation of on going research relevant to following tracks (More
information and the full call-for-papers can be found on the
conference web):

Track 1 : Mobility & Wireless networks
--------------------------------------------------------
- 4G and 5G networks, LTE and LTE-A
- Device to Device (D2D)
- Cellular Technologies for IoT
- Wireless Local Area Networks
- Wireless Personal Area Networks
- Wireless Ad Hoc and Mesh Networks
- Wireless Vehicular Networks
- Cognitive Radio Networks
- Satellite Networks
- Self-organizing and Re-configurable Wireless Networks
- Energy Efficient Wireless Sensor Network Solutions
- Wireless MAC Protocols
- Scheduling Techniques for Wireless Networks
- Wireless QoS Routing Algorithms
- Radio Resource Allocation and Management
- Cross-layer Design and Optimization in Wireless Networks
- Clustering, Topology Control, Coverage and Connectivity
- Cooperation and Relaying in Wireless Networks
- Analysis, Simulation and Performance Evaluation
- Integration of Heterogeneous Mobile, Wireless and Wire-line Radio
  Access Networks
- Mobility, Location Management and Handover Techniques for Wireless
  Mobile Networks
- Multimedia over Wireless and Mobile Systems
- Power-aware Architectures, Algorithms and Protocols for Wireless
  and Mobile Networks
- Wireless Services and Middleware Platforms
- Green Radio Communications
- Measurements, Testbeds and Deployment of Wireless Systems

Track 2: Security
-------------------------

Thematic areas:
- Security engineering. Methodologies, formalisms, modeling, tools,
  code instrumentation
- Cryptography. Algorithms, protocols, attacks
- Security in distributed systems.
- Cryptographic Hardware and Embedded Systems.
- Light-weight cryptography.
- Information Hiding.
- Steganography
- Privacy and Anonymity.
- Security assurance. Evaluation, testing, formal proofs,
  certification.
- Quantum Cryptography and QKD.
- Trusted computing. Analyses and attacks, practical applications...
- Surveillance and monitoring. Intrusion detection, monitoring
  techniques, architectures,...
- Infrastructure. Middleware, proxies, PKIs, AAAs, SSO,
  credentials...
- Social and psychological aspects of security. User-centered
  security
  evaluation, perception of security and threats...
- Security and usability.

Application areas:
- Service Oriented Computing. Platform security, access control,
  Security of the SOC processes (Negotiation, Orchestration),
  Identification of services...
- Cloud computing. Platform security, data protection, software
  protection, surveillance and dynamic reaction.
- Ubiquitous computing, pervasive computing and ambient
  intelligence.
- Secure system models, development support, dynamic reaction, self-
  systems
- Embedded systems. Dynamic replaceability, system security
  assessment, secure system composition, tampering-resistance...
- Security in system evolution. Design for secure evolution,
  evolution oriented surveillance, security patches...
- Critical infrastructures. Protection architectures, redundancy and
  replication, scalability issues...

Track 3: New Technologies & services
--------------------------------------------------------
- New generation Internet, Post IP and IPv6
- NGN architectures, protocols and services management and delivery
- Web 2.0 applications and IMS (IP Multimedia Subsystems)
- Next generation systems & Service-oriented techniques
- IPTV and content distribution networks
- User-centric networking and services
- multimedia indexing and retrieval
- Personalized access to media systems
- Context/content-aware services
- Smart Cities, Homes and E-Health
- Web Commerce & Services, Data models, Web searching & querying
- Web Mining & Web Semantics
- Web service based Grid computing and P2P computing
- Advanced identification techniques (Biometrics, RFID, etc.)
- Virtualization technologies for grid and parallel computing.
- Interactive media, voice and video, games, immersive applications
- Network virtualization, virtual private networks (VPN), and
  services
- VoIP protocols and services
- Content-based networking: caching, distribution, load balancing,
  resiliency
- Mobile/wireless content distribution

                            * * * * *
Submission Instructions
-----------------------------------
Papers should be in English, strictly not exceeding 5 double-column
pages (3,000 words), in Adobe PDF format (which is the only accepted
format for NTMS 2015).

To access the full list of topics, submission guidelines, as well as
venue and travel information please visit: www.ntms-conf.org

CALL FOR WORKSHOPS
--------------------------------------
Workshop proposals should provide sufficient information to evaluate
the quality and importance of the topic, the goals of the workshop,
and the size of the interested community.

Proposals should identify one or more chairs and several other
individuals willing to serve on an organizing committee and assist
with publicity and reviewing.

Proposals should be 2-4 pages and contain at least the workshop
description, goals, potential participants and list of organizers.

IMPORTANT DATES
-------------------------------
submission Deadline: March 1, 2015
Acceptance Notification: May 9, 2015
Camera-Ready: May 25, 2015

Workshops proposals
--------------------------------
Workshop Submission/Proposal deadline: 5 March 2015
Notification: 10 January 2015

Demo Session important dates
--------------------------------------------
Submission deadline: 5 March 2015
Notification of acceptance: 10 March 2015

Tutorial/Keynotes proposals
----------------------------------------
Submission/Proposal deadline: 1 April 2015
Notification: 15 April 2015

General co-Chair
-------------------------
Azzedine Boukerche, University of Ottawa, Canada
Pascal Urien, Telecom ParisTech, France

TPC Chair
----------------
Jalel Ben-Othman,  Universiy Paris  13, France

TPC co-Chairs (New Technologies Track)
-------------------------------------------------------------
Leandro Villas, University of Campinas, Brazil
AbdelHamid Mammeri, DIVA Strategic Networks, Univ. of Ottawa, Canada

TPC co-Chairs (Mobility/Wireless Track)
-----------------------------------------------------------
Steven Martin, LRI, Paris-Sud University/CNRS, France
Hassnaa Moustafa, Intel, USA

TPC co-Chairs (Security Track)
----------------------------------------------
Felix Gomez Marmol from NEC Research Labs, Germany
Gregorio Martinez Perez, University of Murcia, Spain

Tutorial/Keynote Chair
---------------------------------
Stefano Secci, LIP6, France
Luis Henrique M K Costa, Federal University of Rio de Janeiro, Brazil

workshop Chair
----------------------
Leandro Villas, Campinas University, Brazil

Finance Chair
---------------------
Ibrahim Hajjeh, Fransec, France

Publicity Chair
----------------------
Mohamad Badra, Zayed University, UAE

Sponsors Chair
----------------------
Khaldoun Al Agha, Université Paris-Sud, France

Local Organization chair
------------------------------------
Layth Slimane, EFREI-Villejuif, France.