posted by user: arm || 5498 views || tracked by 5 users: [display]

APSIT 2012 : Call for Chapters proposals: Architectures and Protocols for Secure Information Technology


When May 11, 2012 - Oct 1, 2012
Where N/A
Submission Deadline Oct 15, 2012
Categories    security   privacy

Call For Papers


Architectures and Protocols for Secure Information Technology
A book edited by Dr. Ruiz-Martínez, Dr. Pereñíguez-García and Dr.
Marín-López (University of Murcia, Spain)

Recommended topics include, but are not limited to, the following:
• Analysis of secure protocols and architectures
o Advances and trends in secure standard protocols such as TLS,
Kerberos, etc.
o Analysis of secure protocols in different scenarios.
o Comparative or survey of secure protocols for a specific purpose:
authentication, non-repudiation, (mobile) payments, etc.
o Security modelling and vulnerability analysis.
o New techniques for formal or automated validation of protocols and
validation of specific protocols.
o Analysis of different security-related issues such as performance,
traffic and usability.
o Analysis of security architectures in different scenarios:
e-commerce, e-government, etc.
• New secure protocols, architectures or systems for:
o Exchange of information or keying material.
o Authentication.
o Intrusion detection.
o Access control.
o Content distribution.
o Anonymous communications and services.
o Billing, accounting and charging.
o E-commerce, e-business and e-government.
o NGN and IMS.
o Mobile/Embedded systems security and forensics.
o Emerging scenarios such as vehicular communications, Internet of
things, cloud computing, location-based services identity. management,
NFC, RFID, trusted computing, SOA, P2P services, multimedia
communications, etc.

Submission Procedure
Researchers and practitioners are invited to submit on or before October 15, 2012 a full chapter (extended deadline). All submitted chapters will be
reviewed on a double-blind review basis. It is also to be noted that
contributors may also be requested to serve as reviewers for this
project. The length of the paper should be 8,000 words at
least including figures, tables and charts. More information can be found in the following web site:

Related Resources

ML&DataAnalytics 2022   Call for Springer book Chapters ''Machine learning and data analytics for solving business problems: methods, applications, and case studies.'', Springer (USA)
IEEE COINS 2022   IEEE COINS 2022: Hybrid (3 days on-site | 2 days virtual)
SE4GSC 2022   Call for Book Chapters - Software Engineering for Games in Serious Contexts - Theories, Methods, Tools, and Experiences
CEVVE 2022   2022 International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2022)
CBDCI 2022   Call for Chapters: Convergence of Big Data Technologies and Computational Intelligent Techniques
SI on ATD&IS 2021   Special Issue on Advanced Technologies in Data and Information Security, Applied Sciences, MDPI
SEN 2022   Social Epidemic Network (SEN), Call for Book Chapters
CSW 2022   2022 International Workshop on Cyber Security (CSW 2022)
Edited Book in Springer-Verlag 2022   Call for Book Chapters-Machine Learning and Deep Learning for Time Series Processing and Analysis
IEEE DSC 2022   The 2022 IEEE Conference on Dependable and Secure Computing