posted by user: mazdak || 6672 views || tracked by 11 users: [display]

SISC-TS 2013 : Special Issue on Secure Communications - Telecommunication Systems (Springer Journal; ISI Impact Factor 1.02)


When N/A
Where N/A
Submission Deadline Dec 31, 2013
Categories    computer   communications   security   IT

Call For Papers

Special Issue on Secure Communications - Telecommunication Systems (Springer Journal; ISI Impact Factor 1.02)

Telecommunication Systems
Modeling, Analysis, Design and Management
Editor-in-Chief: Bezalel Gavish
ISSN: 1018-4864 (print version)
ISSN: 1572-9451 (electronic version)
Journal no. 11235
ISI Impact Factor 1.02

Special Issue on Secure Communications

Secure communication is when two entities are communicating and do not want a third party to listen in. For that they need to communicate in a way not susceptible to eavesdropping or interception. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what was said. Other than spoken face-to-face communication with no possible eavesdropper, it is probably safe to say that no communication is guaranteed secure in this sense, although practical obstacles such as legislation, resources, technical issues (interception and encryption), and the sheer volume of communication serve to limit surveillance.
With many communications taking place over long distance and mediated by technology, and increasing awareness of the importance of interception issues, technology and its compromise are at the heart of this debate. For this reason, this special issue focuses on communications mediated or intercepted by technology. Trusted Computing also is an approach under present development that achieves security in general at the potential cost of compelling obligatory trust in corporate and government bodies.

Security can be broadly categorized under the following headings, with examples:
 Hiding the content or nature of a communication
o Code – a rule to convert a piece of information (for example, a letter, word, phrase, or gesture) into another form or representation (one sign into another sign), not necessarily of the same type. In communications and information processing, encoding is the process by which information from a source is converted into symbols to be communicated. Decoding is the reverse process, converting these code symbols back into information understandable by a receiver.
o Encryption
o Identity Based
o Steganography covers a broad spectrum of techniques, which include, among others:
 Digital Image Steganography - allows an average user to securely transfer text messages by hiding them in a digital image file.
 Digital Audio Steganography - based on the characteristics of digital audio signals and the human auditory system (HAS).
 Digital Video Steganography - embed small information in the digital video such that the message is imperceptible and robust against attempts to degrade it or remove it from the digital object.
 Steganalysis - The goal of steganalysis is to identify suspected packages, determine whether or not they have a payload encoded into them, and, if possible, recover that payload.

 Hiding the parties to a communication – preventing identification, promoting anonymity
o Crowds and similar anonymous group structures – it is difficult to identify who said what when it comes from a "crowd"
o Anonymous communication devices – unregistered cell phones, Internet cafes
o Anonymous proxies
o Hard to trace routing methods – through unauthorized third-party systems, or relays

 Hiding the fact that a communication takes place
o Security by obscurity – similar to needle in a haystack
o Random traffic – creating random data flow to make the presence of genuine communication harder to detect and traffic analysis less reliable

 The manuscripts for this special issue have to be submitted in the form of a PDF file ONLY to the Corresponding Guest Editor - Dr. Mazdak Zamani ( and NOT to the journal office.
 Guidelines for preparation of the manuscripts are provided at the Telecommunication Systems journal website,
 The submission must include the title, abstract of your paper, and all the authors' names, affiliations and emails.
 All papers will be rigorously reviewed based on the quality: originality, high scientific quality, organization and clarity of writing, and support provided for assertions and conclusion.

 Submission Deadline: December 31, 2013
 Notification of First Round of Review: March 31, 2014
 Submission of Revised Papers for Second Round of Review: April 30, 2014
 Notification of Second Round of Review: June 30, 2014
 Submission of Final Paper: July 31, 2014
 Publication Date (Hard Copy): 2017/2018 (Tentative)

Guest Editors
Prof. Dr. Azizah Abd Manaf
Universiti Teknologi Malaysia
54100 Kuala Lumpur, Malaysia

Assoc. Prof. Dr. Isao Echizen
National Institute of Informatics
2-1-2, Hitotsubashi, Chiyoda-ku, Tokyo, Japan

Dr. Mazdak Zamani
Universiti Teknologi Malaysia
54100 Kuala Lumpur, Malaysia

Prof. Dr. Shamsul Sahibuddin
Universiti Teknologi Malaysia
54100 Kuala Lumpur, Malaysia

Prof. Dr. Yoshiro Imai
Kagawa University
2217-20 Hayashi-cho Takamatsu, Japan

Related Resources

GLOBECOM 2019   Global Communications Conference
CCSEIT 2019   9th International Conference on Computer Science, Engineering and Information Technology
ACM--RSVT--EI Compendex, Scopus 2019   ACM--2019 International Conference on Robotics Systems and Vehicle Technology (RSVT 2019)--EI Compendex, Scopus
MoWIN 2019   8th International Conference on Mobile & Wireless Networks
DASC 2019   17th IEEE International Conference on Dependable Autonomic and Secure Computing
SIPM 2019   7th International Conference on Signal Image Processing and Multimedia
CRYBLOCK 2019   INFOCOM Workshop - 2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems (CryBlock 2019)
CSIP 2019   6th International Conference on Signal Processing
IJIBM 2019   Call For Papers - International Journal of Information, Business and Management
CMIT 2019   7th International Conference of Managing Information Technology