专栏名称: Call4Papers
致力于帮助所有科研人员发表学术论文,向大家及时提供各领域知名会议的deadline以及期刊的约稿信息
目录
相关文章推荐
实验万事屋  ·  四位博士共一发了48.8分的Cell大子刊, ... ·  2 天前  
募格学术  ·  【国庆特惠】Python数据分析与机器学习实 ... ·  1 周前  
51好读  ›  专栏  ›  Call4Papers

【信息安全及密码学】CCF推荐期刊专刊约稿信息3条

Call4Papers  · 公众号  · 科研  · 2017-09-13 09:30

正文

信息安全及密码学

Computers & Security

Celebrating Anniversaries of CERIAS/COAST At Purdue University

全文截稿: 2017-10-01
影响因子: 2.849
期刊难度: ★★★★
CCF分类: B类
网址: http://www.journals.elsevier.com/computers-and-security

2017 marks the 25th anniversary of the founding of the COAST Laboratory at Purdue University, and 2018 is the 20th anniversary of CERIAS. These efforts have resulted in one of the largest research groups in security in the world, with a historic number of PhD graduates and advanced projects.

This special issue celebrates these milestone anniversaries. Anyone who was a faculty member in COAST or CERIAS or who performed research there as a postdoc or graduate student is invited to submit a paper describing research in the focus areas of cyber security, privacy, and cybercrime investigation.




信息安全及密码学

International Journal of Information and Computer Security

Special Issue on: "Multimedia Information Security Solutions on Social Networks"

全文截稿: 2017-11-30
影响因子: 0.0
期刊难度: ★★★
CCF分类: C类
网址: http://www.inderscience.com/jhome.php?jcode=ijics

Social networks have become places where, on a daily basis, many people exchange and share personal information in the form of multimedia over unsecured channels. Information and communication technology (ICT) has proved to be an indispensable and cost-effective technique for the dissemination of such multimedia documents.

However, prevention of copyright violation, authenticity, confidentiality and ownership identity theft have all become potential issues due to malicious attacks and the hacking of information transmitted via these networks. Everyday risks include criminal offences ranging from ownership identity theft to copyright violation, and also personal information or medical history exposure. To tackle these threats, researchers are developing advanced techniques to analyse, prevent and detect these potential issues.

The objective of this special issue is present high-quality research and survey articles that promote research and reflect the most recent advances in addressing the security and privacy issues of multimedia information on networks as well as other emerging environments and applications.

Suitable topics include, but are not limited, to the following:
- Information security
- Multimedia information propagation via social networks
- Access control and identity management
- Security and privacy of multimedia information
- Forensics in social networks
- Phishing problems in social networks
- Secure social-network application development and methodologies
- Cryptographic protocols against attacks
- Security architectures/protocols for cloud computing
- Recognition, identification and classification
- Mobile social network security
- Multimedia information retrieval and feature extraction
- Big data forensics
- Computational multimedia processing
- Multimedia big data
- Multimedia indexing and annotation
- Multimedia retrieval
- Pattern recognition




信息安全及密码学

Computers & Security

Special Issue on Security and Privacy for Edge Computing: Current Progress and Future Challenge

全文截稿: 2017-12-31
影响因子: 2.849
期刊难度: ★★★★
CCF分类: B类
网址: http://www.journals.elsevier.com/computers-and-security

Edge computing is a revolutionary method to optimize cloud computing systems for tackling network bottlenecks. Its characteristic lies in that the data processing such as analytics and knowledge generation are performed at the periphery of the network, as close to the originating source as possible. Network latency can thus be improved. The communication bandwidth requirement between sensors and the data center can also be greatly reduced.

Along with the benefits brought, there are numerous challenges we should take into account, especially with respect to data security and privacy. Various scenarios are highly correlated with sensitive data usage. For example, the sensor may need to collect sensitive information from data producer for some smart services. Meanwhile, peers in the edge computing network need to cooperate with each other for some sensitive jobs without the involvement of the data center. These scenarios result in a high concern from data producers in terms of potential information leakage and misuse, which may compromise their privacy.

Meanwhile, edge computing utilizes a wide range of technologies including wireless sensor networks, mobile data acquisition, mobile signature analysis, peer-to-peer ad hoc networking, local cloud/fog computing, grid/mesh computing, dew computing, mobile edge computing, distributed data storage and retrieval, autonomic self-healing networks, augmented reality, and so on. It is not only of the great necessity but also technically challenging in applying advanced security mechanisms and/or cryptographic techniques to secure edge computing, may it be at the network architecture level, system design level, or implementation at each involved entities.

The aim of this special issue is to present advances in security and privacy enhancing technologies, and provably secure cryptographic techniques, to address such challenges in this rapidly emerging field of edge computing. Topics of interest include (but are not limited to) the following subject categories:
- Privacy-Enhancing Cryptographic Techniques
- Authentication, auditing and accountability in Edge Computing
- Access Control Mechanisms
- Secure Data Analysis and Private Learning
- Outsourced or Verifiable Computation
- Security Model for Edge Computing
- Security Architecture for Edge Computing
- Secure Federation and Orchestration of Edge Devices
- Secure Software-Defined Networking and Virtualization for Edge computing
- Key Management for Edge Computing
- Security in Content Delivery
- Security in Crowdsourcing
- Security in Grid Computing
- Security in the Internet of Things
- Security in Location Services
- Security in Pervasive Systems
- Sensor Network Security
- Trust Management and Reputation Issues
- Intrusion Detection in Edge Computing
- Cyber-Physical Security of Edge Devices
- Usable Security
- Wireless and Mobile Security
- Secure Mobile Application Development
- Mobile (Cloud) User Authentication and Authorization
- Multi-factor (Mobile) System
- Security and Privacy in Mobile Edge Computing



下载Call4Papers App,获取更多详细内容!