The second International Conference on New Technologies, Mobility and Security (NTMS 2008)


Location: TANGIER, Morocco

Event Date/Time: Nov 05, 2008 End Date/Time: Nov 07, 2008
Paper Submission Date: Jun 14, 2008
Report as Spam


NTMS’2008 is the second International Conference on New Technologies, Mobility and Security that will be held from 5 to 7 November, 2008 in TANGIER, MOROCCO. NTMS'2008 conference is technically co-sponsored by IFIP and IEEE Morocco.

NTMS'2008 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Networks, QoS, Network Security and E-commerce, to mention a few, and provides a dynamic forum for researchers, students and professionals to present their state-of-the-art research and development in these interesting areas. The event will be combined with tutorial sessions and workshops. Tutorials will precede the main program, aiming at the dissemination of mature knowledge and technology advances in the field. Two or more Workshops will immediately follow the main conference, offering the opportunity for a more focused exchange of ideas and presentation of on-going research relevant to selected topics.

NTMS'2008 accepted papers will be published in the IEEE Xplore. The best papers of the conference will be considered for publication in Elsevier's Network Security Journal.

Topics of Interest : The NTMS’2008 conference seeks papers describing significant research contributions to the field of News technologies, mobility, security and data communication networks. The research sessions will include presentations of latest research projects, papers, posters, tutorials, panels, demos, industrial track and exhibitions around the following topics:

Design and analysis of Mobile/Wireless Networks and Systems :

Mobile 3G, 4G, LTE (Long Term Evolution), convergence (IMS, …)
Wireless Personal Area Networks and Wireless Local Area Networks (Wi-Fi, ...)
Ad Hoc networking, Sensor networks, Self-organizing mesh networks and autonomic systems • Wireless Mesh Networks, Metropolitan Area Networks & regional area networks (WiMAX/802.16, 802.16e, WiMAXphase 2, WiBro, WiRAN)
Optical networks and switching (new generation SDH, OTN)
Satellite Systems
Vehicular Communication Technologies and Systems
Mobility management and Handover
Medium Access Control & Scheduling Techniques for Wireless Systems
Quality of Service provisioning
Resource allocation management
Performance evaluation
Cross-layer network design and optimization
Cognitive radio and smart antenna
Testbed experiments, Mobile/Wireless Applications and Services

Security :

Network security, vulnerability, authentication and access control
Network fault-tolerance & reliability, debugging & troubleshooting
Confidentiality, Data and system integrity
Intrusion Detection, Prediction, and Countermeasures
Identity management and Trust management
Privacy, contract agreements, and payment systems
Key Distribution and management, Public key infrastructure implementation
Mobile code security
Security and mobility management
Web, e-mail , m-commerce, e-business and e-commerce security
Testbeds, performance evaluation and formal specification methods
Virtualization for security and reliability

New Technologies & services :

Analysis and design of new generation systems (network architectures, protocols, network management, traffic engineering, resource management, quality of service, signalling & scheduling, …)
New generation internet, Post IP and IPv6, Carrier Grade networks, xDSL and FTTx, Power Line Communication
Peer-to-peer, overlay, and content distribution networks
Pervasive, Ubiquitous and Mobile Computing
Agents and Middlewares, Agent Computing and Agent Applications
Grid and cluster computing & Context aware computing
Adaptation software development
Component based software engineering &Software verification & analysis
Web Commerce & Services, Data models, Web searching & querying
Data Mining , XML, Query Processing & Optimization, Storage Structures & Indexing
Web Mining & Web Semantics
Web service based Grid computing and P2P computing Web services
Quantum Cryptography systems
Biometric systems
Virtualization of systems, networks and protocols
Virtualization technologies for grid and parallel computing



Additional Information

Draft papers should be submitted by June 14, 2008. Authors will receive the acceptance notification by July 20, 2008. Final papers for presentation should be sent before July 31, 2008. Tutorial Workshop (Instructor) Submission due : June 22, 2008. Deadline Notification of Tutorial & Workshop Acceptance : July 10, 2008.