posted by user: arm || 6590 views || tracked by 5 users: [display]

APSIT 2012 : Call for Chapters proposals: Architectures and Protocols for Secure Information Technology

FacebookTwitterLinkedInGoogle

Link: http://ants.inf.um.es/staff/arm/cfc-igi.html
 
When May 11, 2012 - Oct 1, 2012
Where N/A
Submission Deadline Oct 15, 2012
Categories    security   privacy
 

Call For Papers

CALL FOR FULL CHAPTER PROPOSALS

Architectures and Protocols for Secure Information Technology
A book edited by Dr. Ruiz-Martínez, Dr. Pereñíguez-García and Dr.
Marín-López (University of Murcia, Spain)

Recommended topics include, but are not limited to, the following:
• Analysis of secure protocols and architectures
o Advances and trends in secure standard protocols such as TLS,
Kerberos, etc.
o Analysis of secure protocols in different scenarios.
o Comparative or survey of secure protocols for a specific purpose:
authentication, non-repudiation, (mobile) payments, etc.
o Security modelling and vulnerability analysis.
o New techniques for formal or automated validation of protocols and
validation of specific protocols.
o Analysis of different security-related issues such as performance,
traffic and usability.
o Analysis of security architectures in different scenarios:
e-commerce, e-government, etc.
• New secure protocols, architectures or systems for:
o Exchange of information or keying material.
o Authentication.
o Intrusion detection.
o Access control.
o Content distribution.
o Anonymous communications and services.
o Billing, accounting and charging.
o E-commerce, e-business and e-government.
o NGN and IMS.
o Mobile/Embedded systems security and forensics.
o Emerging scenarios such as vehicular communications, Internet of
things, cloud computing, location-based services identity. management,
NFC, RFID, trusted computing, SOA, P2P services, multimedia
communications, etc.


Submission Procedure
Researchers and practitioners are invited to submit on or before October 15, 2012 a full chapter (extended deadline). All submitted chapters will be
reviewed on a double-blind review basis. It is also to be noted that
contributors may also be requested to serve as reviewers for this
project. The length of the paper should be 8,000 words at
least including figures, tables and charts. More information can be found in the following web site:
http://ants.inf.um.es/staff/arm/cfc-igi.html

Related Resources

PEMWN 2025   Performance Evaluation & Modeling in Wired and Wireless Networks
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CFEF 2025   CALL FOR BOOK CHAPTERS - CINEMA'S FIRST EPICS IN FOCUS
IEEE-EEEAC 2025   2025 4th International Conference on Electronic Electrical Engineering and Automatic Control-IEEE Xplore/EI/Scopus
RESCUER 2025   The first workshop on REliable and SeCUrE RISC-V architectures
SIGEM 2025   11th International Conference on Signal, Image Processing and Embedded Systems
ICNP 2025   International Conference on Network Protocols
IJGCA 2025   International Journal of Grid Computing & Applications
CfA Celebration 2026   Call for Abstracts for Issue 20 of On_Culture, Celebration, Spring 2026
CSSE 2025   3rd International Conference on Computer Science and Software Engineering