SCI-E 2012 - Special Issue on The Design and Engineering of Cryptographic Solutions for Secure Information Systems
Topics/Call fo Papers
Security and Communication Networks Journal (Wiley) (SCI-E)
Special Issue on The Design and Engineering of Cryptographic Solutions for Secure Information Systems
Information systems range from those deployed on home computers to state, governmental, and
huge enterprise systems using computers connected with local and global networks using wired
and wireless channels of information exchange. In order for the users to have high confidence in
those systems for the protection and authentication of stored and/or transmitted data,
cryptographic solutions have often been provided. It is essential for such solutions to be designed
and implemented using sound engineering approaches and practices as part of the core
functionality of secure information systems. The effective design and engineering of
cryptographic solutions require the understanding of, the requirements of the applications at
hand, their constraints and performance characteristics, the capabilities of the hardware and
software platforms, the nature of the network environments, and whether off the shelf solutions
are feasible, while balancing the desired level of security versus financial costs and risks
involved in deploying particular solutions. This special issue will focus on the effective design
and engineering (including validation) of cryptographic solutions in secure information systems
as they are applied to address topics such as:
access control and intrusion detection,
authentication and authorization,
network security
security protocols, models and policies,
information assurance,
security tools and development platforms,
trust and privacy, standards, guidelines and certification,
copyright protection,
key management and auditing,
computer forensics,
risk assessment,
secure electronic commerce,
biometric and identity management.
Submission Details:
This special issue is open to original, high quality contributions that are not published or
currently under review by other journals or peer-reviewed conferences. Previously published
conference papers must be substantially revised, improved, and extended from their earlier
versions with at least 30% new materials or results to comply with the copyright regulations. For
manuscript submission, the prospective authors should follow the guidelines available from
http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122. Papers should be submitted
online at http://mc.manuscriptcentral.com/scn. When submitting the papers, the authors should
choose the “Manuscript Type” as “Special Issue”, enter the “Running Head” as “SCN-SI-XXX”
and the “Special Issue Title” as “Cryptographic Solutions for Secure Information Systems”,
respectively. Each submission will be reviewed by at least three reviewers before a
recommendation will be made. Contributing authors might also be asked to review some of the
papers submitted to this special issue.
Important Dates:
Manuscripts Due: March 31, 2011.
First Acceptance Notification: June 15, 2011.
Revised Manuscripts Due: July 31, 2011.
Final Acceptance Notification: August 15, 2011.
Camera-Ready Final Manuscript Due: August 31, 2011.
Publication Date: late 2011 / early 2012 (depending on publisher schedules).
Any of the following guest editors may be contacted for further info:
Atilla Elçi, Toros University, Mersin, Turkey, Email: atilla.elci-AT-gmail.com
Josef Pieprzyk, Macquarie University, Sydney, Australia, Email: josef.pieprzyk-AT-mq.edu.au
Mehmet A. Orgun, Macquarie University, Sydney, Australia Email: mehmet.orgun-AT-mq.edu.au
Alexander G. Chefranov, Eastern Mediterranean University, Famagusta, North Cyprus, Email:
Alexander.chefranov-AT-emu.edu.tr
Special Issue on The Design and Engineering of Cryptographic Solutions for Secure Information Systems
Information systems range from those deployed on home computers to state, governmental, and
huge enterprise systems using computers connected with local and global networks using wired
and wireless channels of information exchange. In order for the users to have high confidence in
those systems for the protection and authentication of stored and/or transmitted data,
cryptographic solutions have often been provided. It is essential for such solutions to be designed
and implemented using sound engineering approaches and practices as part of the core
functionality of secure information systems. The effective design and engineering of
cryptographic solutions require the understanding of, the requirements of the applications at
hand, their constraints and performance characteristics, the capabilities of the hardware and
software platforms, the nature of the network environments, and whether off the shelf solutions
are feasible, while balancing the desired level of security versus financial costs and risks
involved in deploying particular solutions. This special issue will focus on the effective design
and engineering (including validation) of cryptographic solutions in secure information systems
as they are applied to address topics such as:
access control and intrusion detection,
authentication and authorization,
network security
security protocols, models and policies,
information assurance,
security tools and development platforms,
trust and privacy, standards, guidelines and certification,
copyright protection,
key management and auditing,
computer forensics,
risk assessment,
secure electronic commerce,
biometric and identity management.
Submission Details:
This special issue is open to original, high quality contributions that are not published or
currently under review by other journals or peer-reviewed conferences. Previously published
conference papers must be substantially revised, improved, and extended from their earlier
versions with at least 30% new materials or results to comply with the copyright regulations. For
manuscript submission, the prospective authors should follow the guidelines available from
http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122. Papers should be submitted
online at http://mc.manuscriptcentral.com/scn. When submitting the papers, the authors should
choose the “Manuscript Type” as “Special Issue”, enter the “Running Head” as “SCN-SI-XXX”
and the “Special Issue Title” as “Cryptographic Solutions for Secure Information Systems”,
respectively. Each submission will be reviewed by at least three reviewers before a
recommendation will be made. Contributing authors might also be asked to review some of the
papers submitted to this special issue.
Important Dates:
Manuscripts Due: March 31, 2011.
First Acceptance Notification: June 15, 2011.
Revised Manuscripts Due: July 31, 2011.
Final Acceptance Notification: August 15, 2011.
Camera-Ready Final Manuscript Due: August 31, 2011.
Publication Date: late 2011 / early 2012 (depending on publisher schedules).
Any of the following guest editors may be contacted for further info:
Atilla Elçi, Toros University, Mersin, Turkey, Email: atilla.elci-AT-gmail.com
Josef Pieprzyk, Macquarie University, Sydney, Australia, Email: josef.pieprzyk-AT-mq.edu.au
Mehmet A. Orgun, Macquarie University, Sydney, Australia Email: mehmet.orgun-AT-mq.edu.au
Alexander G. Chefranov, Eastern Mediterranean University, Famagusta, North Cyprus, Email:
Alexander.chefranov-AT-emu.edu.tr
Other CFPs
- The International Conference for Nanomaterials synthesis and Characterization INSC 2012
- 2011 2nd International Conference on Material and Manufacturing Technology
- The International Conference for Nanomaterials Synthesis and Characterization
- Third International Conference on Soft Computing and Pattern Recognition (SoCPaR 2011)
- 2012 International Conference on Network and Computational Intelligence
Last modified: 2011-01-27 10:39:16