Information security is more and more important in the modern network, it is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions. Confidentiality, integrity and availability are critical requirements for the security of modern computation paradigms, such as cloud computation, distributed computation and P2P networks etc. Information security also handles risk management. Sensitive information must be kept confidential, it cannot be changed, altered or transferred without permission. For example, a message could be modified during transmission by someone intercepting it before it reaches the intended recipient. Good cryptography tools, especially encryption, can help mitigate this security threat. Digital signatures can improve information security by enhancing authenticity processes and prompting individuals to prove their identity before they can gain access to computer data. Trust software can ensure the network running smoothly, secure image processing are among the most useful techniques to securing the social networks like facebook etc, information hiding techniques can also find applications in networks to fingerprint some important digital contents.
The issue will carry revised and substantially extended versions of selected papers presented at the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2015), but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.
Suitable topics include, but are not limited to, the following:
- Encryption and authentication techniques to ensure information security
- Trustworthy software and networks
- Secure image processing in networks
- Secure protocols for communication networks
- Secure techniques for cloud computation
- Information hiding techniques for networks
Submission of manuscripts: 30 January, 2016
Notification to authors: 30 April, 2016
Final versions due: 30 June, 2016