Security and Communication Networks
http://www. interscience.wiley.com/security
Advances in wireless communication systems have enabled the Internet to
be even more ubiquitous in terms of network deployment and management.
However, there are many security challenges ahead if wireless
technologies are to gain the trust and confidence of the users. Thus,
this Special Issue aims to address many aspects of wireless
communication security, in an effort to publish and summarize the
current state-of-the-art research works and to provide insights into
future directions and challenges in the field. The topics for this
Special Issue include:
* Wireless network security foundations, including authorization
* Access control, and intrusion detection and prevention
* Wireless network methodologies and protocols, including agent-based
and mobile code security, and soft computing-based security
* Wireless e-Commerce and enterprise security
* Database system security and safety
* Cross-layer design and security
* Vehicular ad hoc network security and reliability
* RFID and sensor network security and privacy
* Software security for sensor network nodes
* Wireless intrusion detection, localization and countermeasures
* Cryptographic primitives and operations for wireless networks
* Trust, anonymity and privacy models for wireless networks, across
domain mobility
* Wireless network forensics
* Identity-based authentication for wireless networks
* DDoS / DoS attacks
* Secure routing protocols for wireless sensor networks
* Securing digital content over wireless network
Submitted papers should not be considered elsewhere for publication and
the authors must follow the guidelines for preparation of the
manuscripts. The language of the journal is English. 12-point type in
one of the standard fonts, Times, Helvetica, or Courier is preferred.
The paper length should not exceed 20 pages total including all figures
and illustrations. It is not necessary for authors to double-line space
their manuscript. Tables must be on separate pages after the reference
list, and not be incorporated into the main text. Figures should be
uploaded as separate figure files. For manuscript submission authors
should follow the guidelines described in Section ''For Authors'' at
http://www.interscience.wiley.com/security. Prospective authors should
submit their paper online at http://mc.manuscriptcentral.com/scn. When
submitting the papers, the authors should make sure to choose the
Manuscript type as ''Special Issue'', enter the ''Running Head'' and the
''Special Issue title'' as ''SCN-SI-014'' and ''Security and Privacy in
Wireless Networks", respectively.
This special issue additionally selects high quality papers (best
papers) from the Next Generation Wireless Systems 2009 conference
(http://www.sersc.org/NGWS2009/), Melbourne, Australia.
Submission Due Dates:
Manuscript Due: 12th November 2009
Decision Notification: 12th February 2010
Revision Due: 12th May 2010
Publication Date: November/December 2010
Guest Editors:
Naveen Chilamkurti
Department of Computer Science and Computer Engineering
La Trobe University, Melbourne, Australia
n.chilamkurti@latrobe.edu.au
Ben Soh
Department of Computer Science and Computer Engineering
La Trobe University, Melbourne, Australia
b.soh@latrobe.edu.au
Tai-hoon Kim
Dept. of Multimedia Engineering,
Hannam University, Korea
taihoonn@sersc.org
Dr. Naveen Chilamkurti
Postgraduate coursework coordinator
Department of Computer Science and Computer Engineering
La Trobe University | Bundoora
T: 03 9479 1269 | F: 03 9479 3060| W:
http://homepage.cs.latrobe.edu.au/naveen/
La Trobe University - ranked top in Victoria for student satisfaction
(Sweeney Uni Student Report, 2009)
CRICOS Provider 00115M
J Please kindly consider your environment before printing this e-mail
Warning to recipients:
This email and any attachments are confidential and subject to
copyright. If you are not the intended recipient any use, disclosure or
copying is unauthorised. If you have received this email in error please
advise us immediately by reply email and delete all copies. It is your
responsibility to examine this email and any attachments for viruses.
Any personal information in this email must be handled in accordance
with the Information Privacy Act 2000 (Vic).
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment