With the rapid development of the latest information technologies and systems such as cloud computing, big data, internet of things and social networks, data is shared more ubiquitously and perceived more intelligently. Thus security and privacy issues have been cited as a major concern in our society. Fundamental security issues include data confidentiality, information privacy, data integrity, data traceability and service availability, etc.
Cryptography has made great strides in capability and variety over the past few years. It can be integrated with other information security technologies to solve the security issues mentioned above.
This special issue aims to provide a forum for researchers, practitioners, developers and users in trusted computing and information security areas to explore cutting-edge ideas and techniques, and exchange solutions, tools, experiences and results.
The issue will carry revised and substantially extended versions of selected papers presented at the 8th Chinese Conference on Trused Computing and Information Security (CTCIS 2014), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.
Suitable topics include, but are not limited to, the following:
Important Dates
Submission of manuscripts: 20 September, 2014
Notification to authors: 20 November, 2014
Final versions due: 20 January, 2015
- Cryptography and cryptanalysis
- Content security of multimedia
- Fault tolerance and disaster recovery
- Network and communication security
- Privacy in internet of things
- Privacy in social networks
- Security in cloud computing
- Theory and technology of trusted computing
Important Dates
Submission of manuscripts: 20 September, 2014
Notification to authors: 20 November, 2014
Final versions due: 20 January, 2015
No comments:
Post a Comment