Calls for papers
International Journal of Ad Hoc and Ubiquitous Computing
Special Issue on: "Efficient and Secure Algorithms for Ubiquitous Computing"
Makoto Ikeda and Leonard Barolli, Fukuoka Institute of Technology, Japan
Xiaofeng Chen, Xidian University, China
Fatos Xhafa, Technical University of Catalonia, Spain
Today’s networks are going through a rapid evolution. Different kinds of networks with different characteristics are emerging and are integrating in heterogeneous networks. For these reasons, there are many interconnection problems which may occur at different levels in the hardware and software design of communicating entities and communication networks. These kinds of networks need to manage increasing usage demand, provide support for a significant number of services, guarantee their QoS and optimise the utilisation of network resources. Therefore, architectures and algorithms in these networks have become very complex and it seems imperative to focus on new models and methods as well as mechanisms which can enable the networks to perform adaptive behaviours.
The research area of mobile computing has become more important following the recent growth of mobile ad-hoc networks, wireless sensor networks, wireless mesh networks, cellular networks and vehicular networks and their applications. The availability of high bandwidth 3G and 4G infrastructures and the pervasive deployment of low-cost WiFi infrastructures and WiMAX to create hotspots around the world serve to accelerate the development of mobile computing toward ubiquitous computing. Efficiency and security in these networks are considered very important and pose challenging problems.
For this special issue, we would like to invite contributions from academia and industry which show the latest research results in the field of efficient and secure algorithms, architectures, schemes and mechanisms in ubiquitous computing.
The issue will focus on the research challenges and issues in efficient algorithms and security in ubiquitous computing. Manuscripts regarding novel algorithms, architectures, implementations and experiences are welcome.Subject Coverage
Suitable topics include, but are not limited to, the following:
- Efficient and secure algorithms
- Complex and intelligent algorithms
- Meta-heuristic approaches and methods
- Optimisation algorithms
- Multi-hop authentication and authorisation
- Context-aware security models
- Security for ubiquitous multimedia communication
- Secure user interactions and ubiquitous services
- Efficient and secure location-based services
- Trust management in ubiquitous services
- Trusted cloud computing
- Secure group communication/multicast
- Secure machine-to-machine communication
- Security in portable devices and wearable computers
- Security in distributed data mining
- Energy-efficient intrusion detection schemes in mobile computing
Notes for Prospective Authors
Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper).
All papers are refereed through a peer review process.
All papers must be submitted online. To submit a paper, please read our Submitting articles page.
Manuscript due: 31 January, 2015
First round notification: 30 April, 2015
First revision due: 31 July, 2015
Acceptance notification: 30 October, 2015
Final manuscript due: 31 January, 2016