Security and Communication Networks
http://www <http://www/> . interscience.wiley.com/security
Advances in wireless communication systems have enabled the Internet to be even more ubiquitous in terms of network deployment and management. However, there are many security challenges ahead if wireless technologies are to gain the trust and confidence of the users. Thus, this Special Issue aims to address many aspects of wireless communication security, in an effort to publish and summarize the current state-of-the-art research works and to provide insights into future directions and challenges in the field. The topics for this Special Issue include:
* Wireless network security foundations, including authorization
* Access control, and intrusion detection and prevention
* Wireless network methodologies and protocols, including agent-based
and mobile code security, and soft computing-based security
* Wireless e-Commerce and enterprise security
* Database system security and safety
* Cross-layer design and security
* Vehicular ad hoc network security and reliability
* RFID and sensor network security and privacy
* Software security for sensor network nodes
* Wireless intrusion detection, localization and countermeasures
* Cryptographic primitives and operations for wireless networks
* Trust, anonymity and privacy models for wireless networks, across domain mobility
* Wireless network forensics
* Identity-based authentication for wireless networks
* DDoS / DoS attacks
* Secure routing protocols for wireless sensor networks
* Securing digital content over wireless network
Submitted papers should not be considered elsewhere for publication and the authors must follow the guidelines for preparation of the manuscripts. The language of the journal is English. 12-point type in one of the standard fonts, Times, Helvetica, or Courier is preferred. The paper length should not exceed 20 pages total including all figures and illustrations. It is not necessary for authors to double-line space their manuscript. Tables must be on separate pages after the reference list, and not be incorporated into the main text. Figures should be uploaded as separate figure files. For manuscript submission authors should follow the guidelines described in Section ''For Authors'' at http://www.interscience.wiley.com/security. Prospective authors should submit their paper online at http://mc.manuscriptcentral.com/scn. When submitting the papers, the authors should make sure to choose the Manuscript type as ''Special Issue'', enter the ''Running Head'' and the ''Special Iss!
ue title'' as ''SCN-SI-014'' and ''Security and Privacy in Wireless Networks", respectively.
This special issue additionally selects high quality papers (best papers) from the Next Generation Wireless Systems 2009 conference (http://www.sersc.org/NGWS2009/), Melbourne, Australia.
Submission Due Dates:
Manuscript Due: 20th December 2009
Decision Notification: 26th February 2010
Revision Due: 12th May 2010
Publication Date: November/December 2010
Guest Editors:
Naveen Chilamkurti
Department of Computer Science and Computer Engineering
La Trobe University, Melbourne, Australia
n.chilamkurti@latrobe.edu.au
Ben Soh
Department of Computer Science and Computer Engineering
La Trobe University, Melbourne, Australia
b.soh@latrobe.edu.au
Tai-hoon Kim
Dept. of Multimedia Engineering,
Hannam University, Korea
taihoonn@sersc.org
_______________________________________________
Please do not post msgs that are not relevant to the database community at large. Go to www.cs.wisc.edu/dbworld for guidelines and posting forms.
To unsubscribe, go to https://lists.cs.wisc.edu/mailman/listinfo/dbworld
_______________________________________________
Tccc mailing list
Tccc@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/tccc
No comments:
Post a Comment