CALL FOR PAPERS
Special Issue on Cryptography in Networks
International Journal of Networks and Security (IJSN)
ISSN (PRINT): 1741-8405
ISSN (ONLINE): 1741-8413
Published by Inderscience Publishers
- Manuscript submission deadline:
March 1st, April 1st, 2006
- Notification due date:
June 1st, July 1st, 2006
- Camera-ready manuscript due date:
August 1st, Sept. 1st, 2006
- Publication: December 2006
- Liqun Chen (Hewlett-Packard Labs, UK)
- Guang Gong (University of Waterloo, Canada)
- Atsuko Miyaji (JAIST, Japan)
- Phi Joong Lee (Pohang Univ. of Science & Technology, Korea)
- Yi Mu (Univ. of Wollongong, Australia)
- David Pointcheval (Ecole Normale Supérieure, France)
- Josef Pieprzyk (Macquarie Univ., Australia)
- Tsuyoshi Takagi (Future Univ. - Hakodate, Japan)
- Jacques Traore (France Telcom R&D)
- Jennifer Seberry (Univ. of Wollongong, Australia)
- Willy Susilo (Univ. of Wollongong, Australia)
- Huaxiong Wang (Macquarie Uni., Australia)
- Fangguo Zhang (Sun Yat-Sen University, China)
Cryptography plays a key role in network security.
Advances of cryptography can make
computer networks more secure.
Computer technologies have been pushing forward computer
networks for high speed and broad bandwidth.
Therefore, new cryptographic methods and tools must
follow up in order to adapt to these new technologies.
Recent attacks on computer networks, especially on IEEE 802.11 and IEEE 802.15,
are increasing, since
underlying radio communication medium for wireless network provides serious exposure to
attacks against wireless networks.
Security must be enforced to suit the emerging technologies.
This Special Issue aims to provide a platform for
security researchers to present their newly developed cryptographic
technologies in network security. Areas of interest for
this special journal issue include, but are not limited to, the following
- Ad hoc network security
- Anonymity in networks
- Authentication in network and wireless systems
- Cryptographic algorithms and their applications to network security
- Cryptanalysis of network security schemes
- Encryption in network and wireless systems
- Email security
- Data integrity
- Fast cryptographic algorithms and their applications
- Identity-based cryptography in network and mobile applications
- IP security
- Key management
- Multicast security
- Mobile and wireless system security
- Privacy protection
- Security group communications
- Security in internet and WWW
- Security in Peer-to-Peer networks
- Secure routing protocols
- Security in sensor networks
The submission must be
anonymous, with no author names, affiliations,
or obvious references. It should begin with a title, a short abstract,
a list of keywords. The length of the submission should be at most 18
including bibliography and appendices. It should use at least 11-point
and have reasonable sized margins. Please submit full papers in PDF to email@example.com.
Please provide the information of the contact author in the email.
papers must not
be previously published nor submitted for publication elsewhere.
will not exceed 12 single spaced pages in IEEE
All manuscripts will be blindly reviewed by a least three referees.
and a signed copy of the copyright release form will be required for
For any query please email: ymu(at)uow.edu.au