posted by user: InderscienceGL || 7801 views || tracked by 26 users: [display]

IJAHUC - SAPUC 2013 : Int. J. of Ad Hoc and Ubiquitous Computing - Special Issue on: Security Aspects in Pervasive and Ubiquitous Computing

FacebookTwitterLinkedInGoogle

Link: http://www.inderscience.com/info/ingeneral/cfp.php?id=2091
 
When N/A
Where N/A
Submission Deadline Sep 15, 2013
Notification Due Dec 15, 2013
Final Version Due Feb 15, 2014
Categories    ubiquitous computing   pervasive computing   security
 

Call For Papers

Special Issue on: "Security Aspects in Pervasive and Ubiquitous Computing"

Guest Editors:
Muhammad Khurram Khan, King Saud University, Saudi Arabia
Neeraj Kumar, Thapar University, India
Shi-Jinn Horng, National Taiwan University of Science and Technology, Taiwan

Over the last few decades there has been tremendous growth in the area of pervasive and ubiquitous computing. During this era, various portable devices have been invented which are capable of performing various complex operations while keeping in view of the needs of users. These devices are being used in wide varieties of applications such as health monitoring and diagnostic systems, safety alarms, intelligent transport systems and environment monitoring.

But as these devices are vulnerable to various types of attacks (inside and outside) and threats, secure communication between them is of paramount concern in the pervasive and ubiquitous computing environment. This is mainly because of the direct interaction of these devices with the Internet, which is an open environment for information dissemination using these devices. Additionally, because to the lack of pre-deployment infrastructure due to resource constraints in these devices, the research community faces new security challenges to provide efficient solutions for secure communication with practical aspects.

Motivated by recent advances and existing techniques for secure communication in this field, this special issue aims to collect quality research proposals with a solid background in both theoretical and practical aspects. Proposals which are supported by mathematical formulation and validation will be given special attention when considered for inclusion in this issue.

The key objectives of this issue are as follows:

To explore new innovations and ideas with the utility of becoming an end product for the benefits of the community.
To explore the various security threats and precautionary measures for the same to increase the overall performance of systems.

The issue will carry revised and substantially extended versions of selected papers presented at the 3rd IEEE International Symposium on Biometrics and Security Technologies (ISBAST’13), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

Subject Coverage

Suitable topics include but are not limited to the following in the context of pervasive and ubiquitous computing:

Trust management
Intrusion detection and avoidance techniques
Privacy and anonymity
Modern security architectures and implementations
Threat and vulnerability modelling
Lightweight cryptographic solutions
Key agreement, distribution and management
Access control management systems
Secure mobile systems
Secure coding techniques
Formal verification and validation techniques for security
Biometric solutions
Lightweight AAA infrastructures
Secure social networking

Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper).

All papers are refereed through a peer review process.

All papers must be submitted online. To submit a paper, please read our information on preparing and submitting articles.

Related Resources

IJASUC 2020   International Journal of Ad hoc, Sensor & Ubiquitous Computing
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
ASUC 2021   12th International Conference on Ad hoc, Sensor & Ubiquitous Computing
JISA-CYBER-SEC 2020   Special Issue on Trends in Cybersecurity, Journal of Information Security and Applications, Elsevier
EAI ADHOCNETS 2020   (Virtual) 12th EAI International Conference on Ad Hoc Networks
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
AdHoc-Now 2020   The 19th International Conference on Ad Hoc Networks and Wireless
CCNC 2021   IEEE Consumer Communications & Networking Conference
AdHoc-Now 2020   The 19th International Conference on Ad Hoc Networks and Wireless
Cellular and Wireless at HICSS 2021   Cellular and Wireless Networks Minitrack at the 2021 Hawaii International Conference on Systems Sciences