Calls for papers


International Journal of Communication Networks and Distributed Systems
International Journal of Communication Networks and Distributed Systems


Special Issue on: "Emerging Security Issues in Communication Networks and Distributed Systems"

Guest Editor: Dr. K. Chandra Sekaran, NIT Karnataka, India

In today’s scenario, security plays an important role in protecting data/information from various kinds of (increasing) attacks on computing and communication systems with the support of continuous innovative solutions. It is therefore necessary to provide a means for researchers in this domain to promote quality publications of their work.

The main purpose of this special issue is to bring out work on different perspectives of security issues (and solutions) in the domain of communication networks and distributed systems. Security, defined as ensuring protected communication among computing/communication systems and user applications across public and private networks, is the core for guaranteeing confidentiality, privacy and data/information protection. Insecure systems affect the normal functioning of individuals and businesses that are connected. Based on the recent threats and incidents reported to CERT (CMU), security in networks and distributed systems has increasingly become a global challenge. It is therefore critical to design and develop security solutions from different perspectives including that of end-to-end. Besides these, the growing need of wireless, ad-hoc and sensor networks pose threats of a new dimension. Another related technical aspect concerns the communication speed in networks versus complex and time consuming cryptography/security mechanisms and protocols. In this context, this Special Issue focuses on emerging security issues in communication networks and distributed systems.

Subject Coverage
Suitable topics include, but are not limited to:
  • Cryptographic techniques and their applications (confidentiality, digital signatures, multiparty computations, etc.)
  • Cryptographic protocols (for authentication, key distribution and management, forward and proactive security, electronic voting, etc.)
  • Practical implementations of cryptographic protocols in network (wired and wireless)/distributed computing (protocol engineering for secure protocols, meta-level protocols for security,etc.)
  • Secure mobile code and computing (language based, proof-carrying code, mobile agents, code signing, etc.)
  • Security in communication software (secure software engineering, etc.)

Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere

All papers are refereed through a peer review process. A guide for authors, sample copies and other relevant information for submitting papers are available on the Author Guidelines page

Important Dates

Full Papers Due: 15 January, 2008

Notification of Acceptance: 15 April, 2008

Camera-ready Papers Due: 15 May, 2008