MobiSecServ 2019 - Fifth International Conference On Mobile And Secure Services, 2-3 March 2019
Conference Venue: Miami Beach, FL 33141, USA
Papers will be submitted for publication consideration in the IEEE Xplore Digital Library
IEEE Conference Record #: 45340
IEEE Catalog Number: CFP19RAC-ART
ISBN: 978-1-5386-7700-1
https://conferences.ieee.org/conferences_events/conferences/conferencedetails/45340
Full and Short Papers deadline: Full and Short Papers camera ready deadline: January 21st 2019 The submission link for EDAS is the following: Work In Progress Papers deadline: January 7th 2019 Work In Progress Papers camera ready deadline: February 4th 2019 The submission link for EDAS is the following: The fourth MobiSecServ was held in February 2018 at Miami Beach, see the conference website, and the Proceedings of the Fourth International Conference on Mobile and Secure Services
The third MobiSecServ was held in February 2017 at Miami Beach, see the conference website, and the Proceedings of the Third International Conference on Mobile and Secure Services
The second MobiSecServ was held in February 2016 at the Gainesville University, see the conference website, and the Proceedings of the Second International Conference on Mobile and Secure Services
The first MobiSecServ was held in February 2015 at the Gainesville University, see the conference website, and the Proceedings of the First International Conference on Mobile and Secure Services
An early version of MobiSecServ was organized in February 2014 at the Gainesville University, see the workshop website
The University of Florida (UF) is a major, public, comprehensive, land-grant, research university. With more than 50,000 students, UF is now one of the largest universities in the nation. UF has a 2,000-acre campus and more than 900 buildings (including 170 with classrooms and laboratories).
Telecom ParisTech is an international and multidisciplinary French research centre for digital technology, which combines disciplinary expertise at the highest level and a unique capacity for a cross-disciplinary and interdisciplinary approach across all the sectoral areas in direct response to the socio-economic issues of the digital revolution.
Research at Telecom ParisTech relies on 172 faculty members, 14 engineers and technicians, 70 post-PhDs, 60 visiting scientists, 285 PhD students, producing an average of 625 international publications and 20 patents.
The contractual turnover is about 10.8M€.
Saturday March 2
Sunday March 3 December 17th 2018 Full/short Papers Acceptance/Rejection notification January 7th 2019 WIP Papers submission deadline January 21th 2019 WIP Papers Acceptance/Rejection notification
The goal of the "Conference on Mobile Applications, Security, and Services" is to explore the challenges, issues and opportunities both for academic researchers and industrial innovators.
The conference welcomes contributions addressing (but not limited to) the following topics:
Proximity communication technologies for mobile (NFC, Bluetooth Low Energy, ZibBee,…), secure transactions over proximity communications;
Trust for mobile applications and services, Secure Elements, SIM frameworks; SecureSD, (including Google Vault) platforms; Single Wire Protocol (SWP); Trusted Service Manager (TSM); Secure over the air (OTA) services, Flash over the
air (FOTA)Hardware Secure Module (HSM)
New mobile secure architectures. Host Card Emulation (HCE). Trusted Execution Environment (TEE).
New services and business perspectives New payment applications; Apple Pay, Android Pay, Samsung Pay Services; Crypto Currencies (Bitcoin, Ethereum);
secure tokenisation technologies; proximity communication for access control; automotive industry perspectives; applications for the consumer industry; applications for smart cities; Internet Of Things (IoT) new perspectives;
Mobile Applications for Social Networks.
Deployment experimentsand testing for IoT Platforms, payments, transport, ticketing, access control, couponing, macro localization (Tags).
November 12th 2018 November 26th 2018
https://edas.info/newPaper.php?c=25450
https://edas.info/newPaper.php?c=25450&track=94570
Previous Conferences
A video of MobiSecServ 2015 is available at this link
A video of this previous event is available at this link
About the University of Florida and Telecom ParisTech
Preliminary Program
Conference location
Grand Beach Hotel, 7th floor, 4835 Collins Avenue, Miami Beach, FL 33140
8h30: Breakfast
9h15: Opening
9h30-10h30: Keynote
EMV Payment System and Cryptocurrencies
Nour EL MADHOUN, Orange Labs, Caen, France
10h30-12h30: Session 1
Social privacy score through vulnerability contagion process
- Aghiles DJOUDI, LIP6, Sorbonne University, Paris, France
- Guy Pujolle, LIP6, Sorbonne University, Paris, France
Future Security of Smart Speaker and IoT Smart Home Devices
- Shawn Godwin, Dept. of Computer Science Florida Polytechnic University Lakeland, USA
- Brett Glendenning, Dept. of Computer Science Florida Polytechnic University Lakeland, USA
- Kanwalinderjit Gagneja, Dept. of Computer Science Florida Polytechnic University Lakeland, USA
The Revelation of Insider Attacks Two-Step Intrusion Revelation Algorithm
- Harsh Dholakia, Electrical Engineering and Computer Science Texas A&M University- Kingsville, TX, USA
- Phanindra Sidhanthi, Electrical Engineering and Computer Science Texas A&M University- Kingsville, TX, USA
- Gahangir Hossain, Electrical Engineering and Computer Science Texas A&M University- Kingsville, TX, USA
A Novel Moving Target Defense Technique to Secure Communication Links in Software-Defined Networks
- Abdulrahman Almohaimeed, EECS Department Wichita State University Wichita, Kansas, USA
- Abu Asaduzzaman, EECS Department Wichita State University Wichita, Kansas, USA
12h30-14h00: Lunch
14h00-16h00: Session 2
When not to Offload? Analyzing Offload Feasibility in Mobile Cloud Computing
- Abhishek Kulkarni, Electrical Engineering and Computer Science Texas A&M UniversityKingsville, TX, USA
- Ajith Paul, Electrical Engineering and Computer Science Texas A&M UniversityKingsville, TX, USA
- Harsh Dholakia, Electrical Engineering and Computer Science Texas A&M University Kingsville, TX, USA
- Gahangir Hossain, Electrical Engineering and Computer Science Texas A&M University Kingsville, TX, USA
Vulnerability Finding and Firmware Association in Power Grid
- Yuyan Sun, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
- Limin Sun, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
- Zhiqiang Shi, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
- Wenhao Yu, Institute of Information Communication, China Electric Power Research Institute, Beijing, China
- Huan Ying, Institute of Information Communication, China Electric Power Research Institute, Beijing, China
BYOD-Insure: A Security Assessment Model for Enterprise BYOD
- Melva M. Ratchford, College of Business and Information Systems, Dakota State University, Madison, SD, USA
- Yong Wang, Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, SD, USA
Reference Architectures for Security-by-design IoT:Comparative Study
- Valentin VALLOIS, Beamap, LIPADE, Sopra Steria Group & Paris Descartes, Paris, France
- Fouad GUENANE, Beamap, Sopra Steria Group, Paris, France
- Ahmed MEHAOUA, LIPADE, Paris Descartes, Paris, France
16h00-16h30: Break
16h30-18h00: Session 3
Automatic Pedestrians Detection System Based of Features Level Extraction
- Reda Shbib, International University of Beirut, Beirut, Lebanon
- Ali Rachini, Lebanese University, Beirut, Lebanon
IoT Device Discovery for Incidence Response
- Caleb Riggs, Dept. of Computer Science Florida Polytechnic University Lakeland, FL, USA
- Jesal Patel, Dept. of Computer Science Florida Polytechnic University Lakeland, FL, USA
- Kanwalinderjit Gagneja, Dept. of Computer Science Florida Polytechnic University Lakeland, FL, USA
Incorporating Monitoring Points in SDN to Ensure Trusted Links Against Misbehaving Traffic Flows
- Abdulrahman Almohaimeed, EECS Department Wichita State University Wichita, Kansas, USA
- Abu Asaduzzaman, EECS Department Wichita State University Wichita, Kansas, USA
20h00: Social
Free for all registered participants.
Lola Restaurant & Grill
5555 Collins Ave, Miami Beach, FL 33140, États-Unis
http://www.lolarestaurantgrill.com/
9h00: Breakfast
9h45-10h45 Tutorial
Wallets and Crypto Terminals for Blockchain; introducing the Big Bang paradigm
Pascal Urien, Telecom ParisTech, LTCI Laboratory, Paris, France
10h45-12h15: Session 4
Integrity Probe: Using Programmer as Root Of Trust For Bare Metal Blockchain Crypto Terminal
- Pascal Urien, Telecom Paristech, Paris, France
Privacy and Security analysis of cryptocurrency mobile applications
- Ashish Rajendra Sa,i Lero University of Limerick Limerick, Ireland
- Jim Buckley, Lero University of Limerick Limerick, Ireland
- Andrew Le Gear, Horizon Globex Ireland DAC Nexus Center, University of Limerick Limerick, Ireland
Using reputation as a coin to bet on information items distributed in a Smart City
- Luis Silva, Instituto de Telecomunicacoes / University of Aveiro, Portugal
- Carlos Senna, Instituto de Telecomunicacoes, Portugal
- Andre Zuquete, DETI / IEETA / IT, University of Aveiro, Portugal
12h15: Closing
12h30: Lunch
Important Dates
November 12th 2018 November 26th 2018 Full and Short Papers submission deadlineScope
We are looking for both research papers on new applications and presentations of deployment experiments or new business opportunities.
This conference aims to bring researchers and industrial experts together to discuss the latest frontiers of mobile technology and also novel applications that have not been thought of before.
In an always-on and everything connected context, mobile applications are more and more interacting with sensitive or personal resources hosted in cloud computing or Internet of Things infrastructure. As a consequence, security and trust are critical issues, and likely a prerequisite for the deployment of IoT frameworks.
Among other, the NFC technology enables communication in close proximity. With NFC mobiles surfacing the market so quickly, mobile operating systems are prepared for support with dedicated frameworks. This offers researchers and developers a great opportunity for getting quick traction with novel applications.
So far, the main close proximity enabled services deal with payment, access control, or ticketing. Commercial applications today mainly target mobile payments, or eTickets managed by transportation companies. The broad availability of communication technologies fertilizes research and development of novel applications and can go well beyond these intended applications.