Special Issue on Security of Computer Network and Mobile Systems

International Journal of Wireless and Mobile Computing (IJWMC)

ISSN (PRINT): 1741-1084
ISSN (ONLINE): 1741-1092

Published by Inderscience Publishers

Important Dates

  • Manuscript submission deadline: June 1st June 30, 2005
  • Notification due date: September 1st September 4, 2005
  • Camera-ready manuscript due date: November 1st, 2005
  • Publication: Issue 1, 2006

Guest Editors

  • Feng Bao (Institute for Infocomm Research, Singapore)
  • Colin Boyd (QUT, Australia)
  • Dieter Gollmann (TU Hamburg, Germany)
  • Kwangjo Kim (ICU, Korea)
  • Kaoru Kurosawa (Ibaraki Univ., Japan)
  • Masahiro Mambo (Tsukuba Univ., Japan)
  • Chris Mitchell (RHUL, UK)
  • Yi Mu (Univ. of Wollongong, Australia)
  • Phillip Rogaway (UC Davis, USA)
  • Willy Susilo(Univ. of Wollongong, Australia)
  • Vijay Varadharajan (Macquarie Univ., Australia)
  • Moti Yung (Columbia Univ., USA)
  • Fangguo Zhang (Sun Yat-Sen Univ., China)

Subject Coverage

Computer networks play an important role on connecting resources and people. Advances of computer technology have been pushing forward computer networks for high speed and broad bandwidth. Security must be enforced to suit the emerging technologies. With the emergence of wireless technologies, such as IEEE 802.11 and Bluetooth, mobile users are enabled to connect to each other wirelessly. It can be realised with or without any networking infrastructure (ad-hoc mode). Wireless access networks are rapidly becoming a part of our everyday life. However, the security concerns remain a serious impediment to widespread adoption. The underlying radio communication medium for wireless network provides serious exposure to attacks against wireless networks. Research on security in computer networks and mobile systems covers many issues. There are many open issues to be solved. Areas of interest for this special journal issue include, but are not limited to, the following topics:

  • Ad hoc network security
  • Authentication in network and wireless systems
  • Cryptographic algorithms and applications
  • Denial of service
  • Distributed system security
  • Encryption in network and wireless systems
  • Fast cryptographic algorithms and their applications
  • Firewall and distributed access control
  • Identity-based cryptography in network and mobile applications
  • Intrusion Detection and Response
  • Key management
  • Multicast security
  • Mobile Communications Security
  • Privacy Protection
  • Wireless security and algorithms
  • Secure routing protocols
  • Security in Peer-to-Peer networks

Paper Submission

The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of keywords. The length of the submission should be at most 15 pages including bibliography and appendices. It should use at least 11-point fonts and have reasonable sized margins. Please submit full papers in PDF to Submitted papers must not be previously published nor submitted for publication elsewhere. Accepted papers will not exceed 4000 words or 10 single spaced pages in IEEE Transactions style. All manuscripts will be blindly reviewed by a least three referees. Original artwork and a signed copy of the copyright release form will be required for all accepted papers.

Send your query to the guest editor:

A/Prof. Yi Mu
School of Information Technology and Computer Science
University of Wollongong
Wollongong, NSW 2522
Phone: +61 2 4221 5228
Fax: +61 2 4221 4170

Last updated: 1/6/2005