- Architectures, protocols, and algorithms to cope with mobile & wireless Networks
- Distributed algorithms of mobile computing
- OS and middleware support for mobile computing and networking
- Routing, and communication primitives in ad-hoc and sensor networks
- Synchronization and scheduling issues in mobile and ad hoc networks
- Resource management in mobile, wireless and ad-hoc networks
- Data management on mobile and wireless computing
- Integration of wired and wireless networks
- Broadband access networks
- Energy saving protocols for ad hoc and sensor networks
- Complexity analysis of algorithms for mobile environments
- Information access in wireless networks
- Algorithms and modeling for tracking and locating mobile users
- Satellite communications
- Cryptography, security and privacy of mobile & wireless networks
- Performance of mobile and wireless networks and systems
- Mobile ad hoc and sensor networks
- Wireless multimedia systems
- Service creation and management environments for mobile/wireless systems
|
- Data & System Integrity
- E- Commerce
- Software Security
- Secure Cloud Computing
- Security and Privacy in Mobile Systems
- Security and Privacy in Web Sevices
- Security and Privacy Policies
- Security Area Control
- Security Deployment
- Security Management
- Authentication and Non-repudiation
- Information Hiding
- Identification and Authentication
- Insider Threats and Countermeasures
- Intrusion Detection & Prevention
- Access Control and Intrusion Detection
- Cryptography and Information Security
- Intrusion Detection and Vulnerability Assessment
- Security Information Systems Architecture and Design and Security Patterns
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and QoS Network Security
|