CALL FOR POSTERS & DEMOS PAPERS
The 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2025) is inviting authors to submit Posters & Demo papers aim at offering a venue for the latest breakthroughs in the topics of interest of NTMS 2025 to be presented live in interaction with the audience. Posters & Demos ranging from working prototypes, novel applications and ground-breaking ideas to live experiments in the areas shaping New Technologies, Mobility and Security are welcome. We also encourage Posters & Demos from industrial researchers.
We invite authors to submit original contributions in the specific topics include but are not limited to the ones listed below
Track 1 : Mobility & Wireless networks
– Beyond 3G, 4G, LTE, and WiMAX Networks
– Wireless Local Area Networks
– Wireless Personal Area Networks
– Wireless Ad Hoc and Mesh Networks
– Wireless Vehicular Networks
– Cognitive Radio Networks
– Satellite Networks
– Self-organizing and Re-configurable Wireless Networks
– Energy Efficient Wireless Sensor Network Solutions
– Wireless MAC Protocols
– Scheduling Techniques for Wireless Networks
– Wireless QoS Routing Algorithms
– Radio Resource Allocation and Management
– Cross-layer Design and Optimization in Wireless Networks
– Clustering, Topology Control, Coverage and Connectivity
– Cooperation and Relaying in Wireless Networks
– Analysis, Simulation and Performance Evaluation
– Integration of Heterogeneous Mobile, Wireless and Wire-line Radio
– Mobility, Location Management and Handover Techniques for Wireless Mobile Networks
– Multimedia over Wireless and Mobile Systems
– Power-aware Architectures, Algorithms and Protocols for Wireless/Mobile Networks
– Wireless Services and Middleware Platforms
– Green Radio Communications
– Measurements, Testbeds and Deployment of Wireless Systems
Track 2: Cyber Security
– Security engineering. Methodologies, formalisms, modeling, tools, code instrumentation
– Cryptography. Algorithms, protocols, attacks
– Security in distributed systems.
– Cryptographic Hardware and Embedded Systems.
– Light-weight cryptography.
– Information Hiding.
– Steganography
– Privacy and Anonymity.
– Security assurance. Evaluation, testing, formal proofs, certification.
– Quantum Cryptography and QKD.
– Trusted computing. Analyses and attacks, practical applications…
– Surveillance and monitoring. Intrusion detection, monitoring techniques, architectures,…
– Infrastructure. Middleware, proxies, PKIs, AAAs, SSO, credentials…
– Social and psychological aspects of security. User-centered security evaluation, perception of security and threats…
– Security and usability.
Application areas:
– Service Oriented Computing. Platform security, access control, Security of the SOC processes (Negotiation, Orchestration), Identification of services…
– Cloud computing. Platform security, data protection, software protection, surveillance and dynamic reaction.
– Ubiquitous computing, pervasive computing and ambient intelligence.
Secure system models, development support, dynamic reaction, self-*systems
– Embedded systems. Dynamic replaceability, system security assessment, secure system composition, tampering-resistance…
– Security in system evolution. Design for secure evolution, evolution-oriented surveillance, security patches…
– Critical Infrastructures. Protection architectures, redundancy and replication, scalability issues…
Track 3: New Technologies & services
– New generation Internet, Post IP and IPv6
– NGN architectures, protocols and services management and delivery
– Web 2.0 applications and IMS (IP Multimedia Subsystems)
– Next generation systems & Service-oriented techniques
– IPTV and content distribution networks
– User-centric networking and services
– multimedia indexing and retrieval
– Personalized access to media systems
– Context/content-aware services
– Smart Homes and E-Health
– Web Commerce & Services, Data models, Web searching & querying
– Web Mining & Web Semantics
– Web service based Grid computing and P2P computing
– Advanced identification techniques (Biometrics, RFID, etc.)
– Virtualization technologies for grid and parallel computing.
– Interactive media, voice and video, games, immersive applications
– Network virtualization, virtual private networks (VPN), and services – VoIP protocols and services
– Content-based networking: caching, distribution, load balancing,resiliency
Submission guidelines
NTMS 2025 solicits original, unpublished demonstration or posters not currently under review by other conferences or journals. Papers submitted to NTMS 2025 will be assessed based on originality, technical soundness, clarity and interest to a wide audience.
- NTMS 2025 Poster paper is focused on the design, development, implementation of work in-progress within the scope of NTMS 2025. Submissions should be original, unpublished work, not currently under review by other conferences or journals. Poster Papers submitted to NTMS 2025 will be assessed based on originality, technical soundness, clarity and interest to a wide audience.
- NTMS 2025 Demo paper is focused on the demonstration of early prototypes and showcases products within the scope of NTMS 2025.
The proposal should provide the demo background and further focus on the demo settings and the application, possibly with visual outcomes to highlight the interest of the demo. Demo Papers submitted to NTMS 2025 will be assessed based on originality, technical soundness, clarity and interest to a wide audience. The proposal may be complemented with additional documents like PowerPoint slides that clarify the demonstration, as well as the list of technical requirements for the demonstration (power outlet, space, additional equipment, etc.). These additional documents should be sent directly to the TPC co-chairs via e-mail.
Submission link: https://edas.info/newPaper.php?c=33067&track=127545
Only PDF files will be accepted for the review process and all submissions must be done electronically through EDAS. All submissions must be written in English, with minimum of 10-point font, up to 3 pages and must use standard IEEE two-column conference templates that can be downloaded from https://www.ieee.org/conferences/publishing/templates.html.
At least one author is required to register, at the full rate, to present accepted Poster & Demo papers at the conference and for the paper to appear in the proceedings and the IEEE digital library.
Important date
- Submission deadline: April 21, 2025
- Notification date: May 2, 2025
- Camera-ready paper: May 15, 2025
TPC Co-Chairs
- Ahmad FADLALLAH <a.fadlallah@usal.edu.lb>
- Lyes Khoukhi <lyes.khoukhi@ensicaen.fr>
Technical sponsors
NTMS 2025 is technically co-sponsored by IEEE, IEEE ComSoc.
All accepted & presented papers will be submitted to IEEE Xplore.