Calls for papers

 

International Journal of High Performance Computing and Networking
International Journal of High Performance Computing and Networking

 

Special Issue on: "Advances in Information Security and Networks"


Guest Editors:
Fatos Xhafa, Technical University of Catalonia, Spain
Xu An Wang, Engineering University of CAPF, China


Information security is more and more important in the modern network, it is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are critical requirements for the security of modern computation paradigms, such as cloud computation, distributed computation and P2P networks etc. Information security also handles risk management. Sensitive information must be kept confidential, it cannot be changed, altered or transferred without permission. For example, a message could be modified during transmission by someone intercepting it before it reaches the intended recipient. Good cryptography tools, especially encryption, can help mitigate this security threat. Digital signatures can improve information security by enhancing authenticity processes and prompting individuals to prove their identity before they can gain access to computer data. Trust software can ensure the network running smoothly, secure image processing are among the most useful techniques to securing the social networks like facebook etc, information hiding techniques can also find applications in networks to fingerprint some important digital contents.

The issue will carry revised and substantially extended versions of selected papers presented at 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2015), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.

Subject Coverage
Suitable topics include, but are not limited to, the following:

  • Encryption and authentication techniques to ensure information security
  • Trustworthy software and networks
  • Secure image processing in networks
  • Secure protocols for communication networks
  • Secure techniques for cloud computation
  • Information hiding techniques for networks

Notes for Prospective Authors

Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper).

All papers are refereed through a peer review process.

All papers must be submitted online. To submit a paper, please read our Submitting articles page.


Important Dates

Manuscripts due by: 30 January, 2016

Notification to authors: 30 April, 2016

Final versions due by: 30 June, 2016