CFP: Security and Communication Networks (Wiley), SI on on Trusted Network Computing, DEADLINE EXTENDED
View: 413
Website |
Edit Freely
Category TRUST
Deadline: January 31, 2013 | Date: May 31, 2013-June 02, 2013
Venue/Country: Wiley, U.K.
Updated: 2013-01-16 12:54:12 (GMT+9)
Call For Papers - CFP
CALL FOR PAPERSSecurity and Communication Networks (Wiley)Special Issue on Trusted Network ComputingThemeWith the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security, and privacy are becoming more and more demanding. Therefore, there is a grand challenge that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. As a result, we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security, and privacy at the same time. As useful and innovative technologies, trusted computing and communications are attracting researchers with more and more attention in communication networks.The main objective of the special issue is to provide an ideal international communication medium for the research community and facilitate the enhancement of the findings in the rapidly developed fields of trusted network computing. TopicsTopics of particular interests include (but are not limited to) the following:- Trusted communication protocols.- Trusted network management.- Trusted network configurations.- Trusted network architectures.- Trusted end-host securing.- Federated, heterogeneous, and distributed computing in trusted network environments.- Trust in mobile and wireless communications.- Trust in e-commerce and e-government.- Trust in social networks.Submission DetailsSubmitted papers should not be considered elsewhere for publication and the authors must follow the guidelines for preparation of the manuscripts. The language of the journal is English; 12-point type in one of the standard fonts, Times, Helvetica, or Courier is preferred. The paper length should not exceed 20 pages total including all figures and illustrations. It is not necessary for authors to double-line space their manuscript. Tables must be on separate pages after the reference list and not be incorporated into the main text. Figures should be uploaded as separate figure files. For manuscript submission authors should follow the guidelines described in Section “For Authors” at wileyonlinelibrary.com/journal/security. Prospective authors should submit their paper online at mc.manuscriptcentral.com/scn. When submitting the papers, the authors should make sure to choose the Manuscript type as “Special Issue”, enter the “Running Head” and the “Special Issue title” as “SCN-SI-53” and “TrustedNetwork Computing”, respectively. Important Dates:Submission Due Date: Janurary 31, 2013 (EXTENDED DEADLINE)First-Round Review Notification: March 31, 2013Revision Due Date: April 30, 3013Final Decision Date: May 31, 2013Guest Editors:Yulei Wu, Computer Network Information Center, Chinese Academy of Sciences, China (wuyulei AT cstnet DOT cn)Guojun Wang, Department of Computer, Science, Central South University, ChinaGeyong Min, School of Computing, Informatics and Media, University of Bradford, UKAhmed Al-Dubai, School of Computing, Edinburgh Napier University, UK
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.