<div dir="ltr">
<i style="color:rgb(0,0,0);font-family:arial,sans-serif;font-size:12.8px;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial">[Apologies if you got multiple copies of this invitation]</i><p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;text-align:center;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>The Fourth IEEE International Workshop on Mobile Cloud Computing systems, Management, and Security (MCSMS-2018)<span></span></span></p><p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;text-align:center;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><a href="http://emergingtechnet.org/MCSMS2018/" target="_blank" style="color:rgb(17,85,204)"><span style="font-size:12pt;font-family:"Times New Roman",serif;color:blue">http://emergingtechnet.org/<wbr>MCSMS2018/</span></a><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></p><p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;text-align:center;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">in conjunction with<span> </span><br></span><a href="http://emergingtechnet.org/FMEC2018/index.php" target="_blank" style="color:rgb(17,85,204)"><span style="font-size:12pt;font-family:"Times New Roman",serif;color:blue">The Third IEEE International Conference on Fog and Mobile Edge Computing (FMEC 2018)</span></a><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span><br><br>Barcelona, Spain. April 23-26, 2018<span></span></span></p><p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;text-align:center;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:14pt;color:red"><span></span></span></p><p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;text-align:center;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:14pt;color:red">Submission Date:<span> </span><span class="gmail-aBn" tabindex="0" style="border-bottom:1px dashed rgb(204,204,204)"><span class="gmail-aQJ" style="top: 2px; z-index: -1;">February 10th</span></span>. 2018 (Final deadline)</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><u><span style="font-size:12pt;font-family:"Times New Roman",serif;color:black">Call for Papers:</span></u><u><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></u></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;text-align:justify;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">With a Mobile Cloud Computing (MCC) market value of US$9.5 billion in 2014 and with more than 1 trillion cloud-ready devices in the next four years, MCC is considered as one of today's hottest new technologies in both academia and industry. MCC integrates different major technologies such as smart devices technologies (phones, tablets, watches, …etc), cloud services, big data, and cloud computing in one platform that services the end users. Despite the rapid growth of MCC, many issues are still challenging and need to be addressed. These challenges are related to the underlying networks, cloud services, security, the required Quality of Service, the availability of services, the needed user data management, and many others. The International Workshop on Mobile Cloud Computing systems, Management, and Security (MCSMS) is introduced as a forum for scientists, researchers, students, and practitioners to present their latest research results, ideas, and developments in the area of Mobile Cloud Computing that addresses the aforementioned challenges. MCSMS 2018 workshop aims to investigate the opportunities and requirements for Mobile Cloud Computing, as well as Fog and Edge Computing domains. The objective of MCSMS2018 is to provide a forum for scientists, engineers, and researchers to discuss their research and results on all aspects of Mobile Cloud Computing (MCC) as well as Fog and Mobile Edge Computing (FMEC). Researchers are encouraged to submit original research contributions in all major areas, which include, but not limited to:<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;text-align:justify;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing Systems.<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing Security and Privacy Issues.<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing Pricing and billing models.<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing support for VANETS and MANETS<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Cloudlet based computing<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Lightweight authentication mechanisms in Mobile Cloud Computing architecture.<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Access Control models in Mobile Cloud Computing.<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Identification of incentives for FMEC service providers.<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* The future perspective for Mobile Cloud Computing: Challenges and Open Issues.<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing Quality of Service (QoS) improvements techniques.<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing architecture features and evolution.<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing Networking and Communication considerations<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing Software development platform and enabled new applications<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing Power Efficiency for resources and networking<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing Availability and Quality of Service.<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Security and privacy of mobile cloud computing<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing Resource Management, Optimization, and Migration<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing Support for Multimedia Communication and Game Computing<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing Support for Big Data Management<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Mobile Cloud Computing intrusion detection systems<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Security of pricing and billing for mobile cloud computing services<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Security of mobile, peer-to-peer and pervasive services in clouds<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Security of mobile commerce and mobile Internet of Things<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Security of mobile social networks<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Security and privacy in smartphone devices<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Security and privacy in social applications and networks<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Security of Mobile, peer-to-peer and pervasive services in clouds<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:16.8667px;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;line-height:18.4px;font-family:"Times New Roman",serif">* Network virtualization and cloud-based radio access networks<span style="color:black"> </span><span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><u><span style="font-size:12pt;font-family:"Times New Roman",serif;color:black">Important Dates:</span></u><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif;color:red"></span><span style="font-size:14pt;color:red">Submission Date:<span> </span><span class="gmail-aBn" tabindex="0" style="border-bottom:1px dashed rgb(204,204,204)"><span class="gmail-aQJ" style="top: 2px; z-index: -1;">February 10th</span></span>. 2018 (Final deadline)</span><span style="font-size:12pt;color:black"><br>Notification to Authors:<span> </span><span class="gmail-aBn" tabindex="0" style="border-bottom:1px dashed rgb(204,204,204)"><span class="gmail-aQJ" style="top: 2px; z-index: -1;">February 20th, 2018</span></span><br>Camera Ready Submission:<span> </span><span class="gmail-aBn" tabindex="0" style="border-bottom:1px dashed rgb(204,204,204)"><span class="gmail-aQJ" style="top: 2px; z-index: -1;">March 5th, 2018</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><u><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></u></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><u><span style="font-size:12pt;font-family:"Times New Roman",serif">Instructions for Authors</span></u><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Prospective authors are invited to submit full papers of up to 6 pages, strictly following the IEEE Proceedings Templates. Submitted papers will be peer-reviewed. At least one of the authors of any accepted paper should register and present the paper at the workshop. Only the presented will appear in the conference proceedings and will be submitted for IEEE to be included in IEEE Xplore. Please submit your paper in PDF format via the electronic submission system<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">.<span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><u><span style="font-size:12pt;font-family:"Times New Roman",serif">Journal Special Issues:</span></u><span style="font-size:12pt;font-family:"Times New Roman",serif"><br>Selected papers from the will be invited to submit an extended version to the following journal. Papers will be selected based on their reviewers’ scores and appropriateness to the Journal’s theme.<br>* Cluster Computing Journal (IF: 2.04) - Springer<br>* Concurrency and Computation: Practice and Experience Journal (IF: 1.13) - Wiley<b><u></u></b><span></span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span></span></p><p class="MsoNormal" style="margin:0in 0in 0.0001pt;color:rgb(0,0,0);font-style:normal;font-variant-ligatures:normal;font-variant-caps:normal;font-weight:400;letter-spacing:normal;text-align:start;text-indent:0px;text-transform:none;white-space:normal;word-spacing:0px;background-color:rgb(255,255,255);text-decoration-style:initial;text-decoration-color:initial;line-height:normal;font-size:11pt;font-family:Calibri,sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif;color:black">Please send any inquiry on MCSMS</span><span style="font-size:12pt;font-family:"Times New Roman",serif"> 2018<span> <span> </span></span>to Syed Hassan Ahmed (</span><a href="mailto:sh.ahmed@ieee.org" target="_blank" style="color:rgb(17,85,204)"><span style="font-size:12pt;font-family:"Times New Roman",serif;color:blue">sh.ahmed@ieee.org</span></a><span style="font-size:12pt;font-family:"Times New Roman",serif">)</span></p>
<br></div>