posted by user: arm || 6573 views || tracked by 5 users: [display]

APSIT 2012 : Call for Chapters proposals: Architectures and Protocols for Secure Information Technology

FacebookTwitterLinkedInGoogle

Link: http://ants.inf.um.es/staff/arm/cfc-igi.html
 
When May 11, 2012 - Oct 1, 2012
Where N/A
Submission Deadline Oct 15, 2012
Categories    security   privacy
 

Call For Papers

CALL FOR FULL CHAPTER PROPOSALS

Architectures and Protocols for Secure Information Technology
A book edited by Dr. Ruiz-Martínez, Dr. Pereñíguez-García and Dr.
Marín-López (University of Murcia, Spain)

Recommended topics include, but are not limited to, the following:
• Analysis of secure protocols and architectures
o Advances and trends in secure standard protocols such as TLS,
Kerberos, etc.
o Analysis of secure protocols in different scenarios.
o Comparative or survey of secure protocols for a specific purpose:
authentication, non-repudiation, (mobile) payments, etc.
o Security modelling and vulnerability analysis.
o New techniques for formal or automated validation of protocols and
validation of specific protocols.
o Analysis of different security-related issues such as performance,
traffic and usability.
o Analysis of security architectures in different scenarios:
e-commerce, e-government, etc.
• New secure protocols, architectures or systems for:
o Exchange of information or keying material.
o Authentication.
o Intrusion detection.
o Access control.
o Content distribution.
o Anonymous communications and services.
o Billing, accounting and charging.
o E-commerce, e-business and e-government.
o NGN and IMS.
o Mobile/Embedded systems security and forensics.
o Emerging scenarios such as vehicular communications, Internet of
things, cloud computing, location-based services identity. management,
NFC, RFID, trusted computing, SOA, P2P services, multimedia
communications, etc.


Submission Procedure
Researchers and practitioners are invited to submit on or before October 15, 2012 a full chapter (extended deadline). All submitted chapters will be
reviewed on a double-blind review basis. It is also to be noted that
contributors may also be requested to serve as reviewers for this
project. The length of the paper should be 8,000 words at
least including figures, tables and charts. More information can be found in the following web site:
http://ants.inf.um.es/staff/arm/cfc-igi.html

Related Resources

PEMWN 2025   Performance Evaluation & Modeling in Wired and Wireless Networks
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
GenAI_Cybersec 2025   Call for Book Chapters: Generative AI for Cybersecurity
IEEE TPS 2025   IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications
Digital Technology and Language Teaching 2025   Routledge-CRC Press-Taylor and Francis Call for Chapters: Digital Technology and Language Teaching: Exploring New Frontiers in Language Education
ITCCMA 2025   12th International Conference on Information Technology, Control, Chaos, Modeling and Applications
RESCUER 2025   The first workshop on REliable and SeCUrE RISC-V architectures
MLNLP 2025   6th International Conference on Machine Learning Techniques and NLP
ICNP 2025   International Conference on Network Protocols
CfA Celebration 2026   Call for Abstracts for Issue 20 of On_Culture, Celebration, Spring 2026