Calls for papers

 

International Journal of Internet Protocol Technology
International Journal of Internet Protocol Technology

 

Special Issue on: "Security and Dependability of Networks and the Internet"


Guest Editors:
Ilsun You, Korean Bible University, South Korea
Jian Weng, Jinan University, China
Zheli Liu, Nankai University, China
Xiaochun Cheng, Middlesex University, UK


Currently, the usage of network and internet services is common and still growing day by day, but at the same time is raising various security issues. Networks are under security attacks of various kinds. Extensive attacks can cause a heavy loss in a few seconds. Therefore, securing networks is imperative. Researchers, analysts, designers and developers are taking considerable interest in different aspects of network and internet security. Advanced security methods and intrusion detection techniques can play a significant role in detecting and preventing security attacks. Reliable security solutions that rely on both in-depth cryptography and secure engineering such as data confidentiality, data integrity, authentication, non-repudiation and access control services are required.

In short, providing security in computer communications, networks and the internet is one of the major challenges of the current age. This special issue intends to present state-of-the-art research in the area of security for networks and the internet. It will focus on advances in cryptography, security engineering and its application issues for network and internet environments. It will also serve as a useful reference for cryptography, security and their applications and will inform readers of the most important state-of-the-art technologies in security and dependability of networks.

In this context, this special issue aims to publish high-quality, original, unpublished research papers covering all aspects related to security and privacy of networks and the internet.

Subject Coverage
Suitable topics include, but are not limited to, the following:

  • Access and usage control
  • Application security
  • Authentication and audits
  • Biometric security
  • Cloud security
  • Cryptographic protocols
  • Cyber-physical systems security
  • Data security and privacy
  • Digital forensics
  • Digital rights management
  • Distributed systems security
  • Formal models in security
  • Identity management
  • Intrusion detection and prevention
  • Intrusion tolerance and recovery
  • Key management
  • Language-based security
  • Malware analysis and mitigation
  • Network security
  • Operating systems security
  • Privacy and anonymity
  • Secure data streams
  • Security and usability
  • Security testing
  • Sensor and ad hoc network security
  • Smartphone security
  • Software security
  • Usable security
  • Vulnerability detection and mitigation
  • Web security

Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper).

All papers are refereed through a peer review process.

All papers must be submitted online. To submit a paper, please read our Submitting articles page.


Important Dates

Submission deadline: 8 December, 2015