posted by user: SCN_SI_2011 || 8651 views || tracked by 18 users: [display]

SCN-SI 2011 : Security and Communication Networks Journal: Special Issue on Security and Privacy in Ubiquitous Computing

FacebookTwitterLinkedInGoogle

Link: http://onlinelibrary.wiley.com/doi/10.1002/sec.290/full
 
When N/A
Where N/A
Submission Deadline May 20, 2011
Notification Due Aug 19, 2011
Final Version Due Nov 25, 2011
Categories    computer security   privacy   ubiquitous   security
 

Call For Papers

Security and Communication Networks Journal: Special Issue on Security and Privacy in Ubiquitous Computing

Editors: Ali Miri (Ryerson University, Canada), Nen-Fu Huang (National Tsing Hua University, Taiwan, ROC), and Abderrahim Benslimane (University of Avignon, France)

The research area of mobile computing has become more important following the recent widespread drive towards mobile ad hoc networks, wireless sensor networks and vehicular ad hoc network tracking technologies and their applications. The availability of high bandwidth 3G infrastructures and the pervasive deployment of low cost WiFi infrastructures and WiMAX to create hotspots around the world serve to accelerate the development of mobile computing towards ubiquitous computing. Security and privacy in converged computing systems are considered an important part of these systems, and pose challenging open problems. This special issue will focus on the research challenges and issues in security and privacy in ubiquitous computing. Manuscripts regarding novel algorithms, architectures, implementations and experiences are welcome. Topics include but are not limited to:
- Secure architectures for converged communication networks
- Multi-hop authentication and authorization
- Context-aware security in computing
- Security management of mobile data
- Security for ubiquitous multimedia communication
- Secure user interactions and ubiquitous services
- Security and privacy in location based services
- Security and privacy in mobile social networks
- Trust management in ubiquitous services
- Security in home networks
- Homeland security and surveillance
- Trusted cloud computing
- Secure group communication/multicast
- Secure machine-to-machine communication
- Security in portable devices and wearable computers
- Privacy protection in distributed data mining
- Energy efficient intrusion detection schemes in mobile computing

For more information, please see http://onlinelibrary.wiley.com/doi/10.1002/sec.290/full

Related Resources

ICCSN 2023   IEEE--2023 15th International Conference on Communication Software and Networks (ICCSN 2023)
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
ICCCN 2023   The 32nd International Conference on Computer Communications and Networks
SI-KM4LAW 2023   Journal Special Issue KNOWLEDGE MANAGEMENT FOR LAW in Computer Law and Security Review
EvoCompAISecurity&Privacy 2022   Evolutionary Computing for AI-Driven Security and Privacy: Advancing the state-of-the-art applications
Frontiers-SI 2023   New trends in Security, Trust, and Privacy in Future Cyber-Systems
ITCA 2023   11th International Conference of Information Technology, Control and Automation
SI on NT-ST&P in FCS 2023   New trends in Security, Trust, and Privacy in Future Cyber-Systems