【信息安全及密码学】CCF推荐期刊专刊约稿信息3条

2017 年 9 月 13 日 Call4Papers Call4Papers
信息安全及密码学

Computers & Security

Celebrating Anniversaries of CERIAS/COAST At Purdue University

全文截稿: 2017-10-01
影响因子: 2.849
期刊难度: ★★★★
CCF分类: B类
网址: http://www.journals.elsevier.com/computers-and-security
2017 marks the 25th anniversary of the founding of the COAST Laboratory at Purdue University, and 2018 is the 20th anniversary of CERIAS. These efforts have resulted in one of the largest research groups in security in the world, with a historic number of PhD graduates and advanced projects.

This special issue celebrates these milestone anniversaries. Anyone who was a faculty member in COAST or CERIAS or who performed research there as a postdoc or graduate student is invited to submit a paper describing research in the focus areas of cyber security, privacy, and cybercrime investigation.




信息安全及密码学

International Journal of Information and Computer Security

Special Issue on: "Multimedia Information Security Solutions on Social Networks"

全文截稿: 2017-11-30
影响因子: 0.0
期刊难度: ★★★
CCF分类: C类
网址: http://www.inderscience.com/jhome.php?jcode=ijics
Social networks have become places where, on a daily basis, many people exchange and share personal information in the form of multimedia over unsecured channels. Information and communication technology (ICT) has proved to be an indispensable and cost-effective technique for the dissemination of such multimedia documents.

However, prevention of copyright violation, authenticity, confidentiality and ownership identity theft have all become potential issues due to malicious attacks and the hacking of information transmitted via these networks. Everyday risks include criminal offences ranging from ownership identity theft to copyright violation, and also personal information or medical history exposure. To tackle these threats, researchers are developing advanced techniques to analyse, prevent and detect these potential issues.

The objective of this special issue is present high-quality research and survey articles that promote research and reflect the most recent advances in addressing the security and privacy issues of multimedia information on networks as well as other emerging environments and applications.

Suitable topics include, but are not limited, to the following:
- Information security
- Multimedia information propagation via social networks
- Access control and identity management
- Security and privacy of multimedia information
- Forensics in social networks
- Phishing problems in social networks
- Secure social-network application development and methodologies
- Cryptographic protocols against attacks
- Security architectures/protocols for cloud computing
- Recognition, identification and classification
- Mobile social network security
- Multimedia information retrieval and feature extraction
- Big data forensics
- Computational multimedia processing
- Multimedia big data
- Multimedia indexing and annotation
- Multimedia retrieval
- Pattern recognition




信息安全及密码学

Computers & Security

Special Issue on Security and Privacy for Edge Computing: Current Progress and Future Challenge

全文截稿: 2017-12-31
影响因子: 2.849
期刊难度: ★★★★
CCF分类: B类
网址: http://www.journals.elsevier.com/computers-and-security
Edge computing is a revolutionary method to optimize cloud computing systems for tackling network bottlenecks. Its characteristic lies in that the data processing such as analytics and knowledge generation are performed at the periphery of the network, as close to the originating source as possible. Network latency can thus be improved. The communication bandwidth requirement between sensors and the data center can also be greatly reduced.

Along with the benefits brought, there are numerous challenges we should take into account, especially with respect to data security and privacy. Various scenarios are highly correlated with sensitive data usage. For example, the sensor may need to collect sensitive information from data producer for some smart services. Meanwhile, peers in the edge computing network need to cooperate with each other for some sensitive jobs without the involvement of the data center. These scenarios result in a high concern from data producers in terms of potential information leakage and misuse, which may compromise their privacy.

Meanwhile, edge computing utilizes a wide range of technologies including wireless sensor networks, mobile data acquisition, mobile signature analysis, peer-to-peer ad hoc networking, local cloud/fog computing, grid/mesh computing, dew computing, mobile edge computing, distributed data storage and retrieval, autonomic self-healing networks, augmented reality, and so on. It is not only of the great necessity but also technically challenging in applying advanced security mechanisms and/or cryptographic techniques to secure edge computing, may it be at the network architecture level, system design level, or implementation at each involved entities.

The aim of this special issue is to present advances in security and privacy enhancing technologies, and provably secure cryptographic techniques, to address such challenges in this rapidly emerging field of edge computing. Topics of interest include (but are not limited to) the following subject categories:
- Privacy-Enhancing Cryptographic Techniques
- Authentication, auditing and accountability in Edge Computing
- Access Control Mechanisms
- Secure Data Analysis and Private Learning
- Outsourced or Verifiable Computation
- Security Model for Edge Computing
- Security Architecture for Edge Computing
- Secure Federation and Orchestration of Edge Devices
- Secure Software-Defined Networking and Virtualization for Edge computing
- Key Management for Edge Computing
- Security in Content Delivery
- Security in Crowdsourcing
- Security in Grid Computing
- Security in the Internet of Things
- Security in Location Services
- Security in Pervasive Systems
- Sensor Network Security
- Trust Management and Reputation Issues
- Intrusion Detection in Edge Computing
- Cyber-Physical Security of Edge Devices
- Usable Security
- Wireless and Mobile Security
- Secure Mobile Application Development
- Mobile (Cloud) User Authentication and Authorization
- Multi-factor (Mobile) System
- Security and Privacy in Mobile Edge Computing



下载Call4Papers App,获取更多详细内容!



登录查看更多
2

相关内容

ACM 国际多媒体大会(英文名称:ACM Multimedia,简称:ACM MM)是多媒体领域的顶级国际会议,每年举办一次。
【CCL 2019】2019信息检索趋势,山东大学教授任昭春博士
专知会员服务
28+阅读 · 2019年11月12日
六篇 CIKM 2019 必读的【图神经网络(GNN)】长文论文
专知会员服务
37+阅读 · 2019年11月3日
【深度学习视频分析/多模态学习资源大列表】
专知会员服务
90+阅读 · 2019年10月16日
【新书】Python编程基础,669页pdf
专知会员服务
186+阅读 · 2019年10月10日
[综述]深度学习下的场景文本检测与识别
专知会员服务
77+阅读 · 2019年10月10日
【哈佛大学商学院课程Fall 2019】机器学习可解释性
专知会员服务
99+阅读 · 2019年10月9日
CCF推荐 | 国际会议信息6条
Call4Papers
9+阅读 · 2019年8月13日
CCF推荐 | 国际会议信息10条
Call4Papers
7+阅读 · 2019年5月27日
人工智能 | SCI期刊专刊/国际会议信息7条
Call4Papers
7+阅读 · 2019年3月12日
人工智能 | CCF推荐期刊专刊约稿信息6条
Call4Papers
5+阅读 · 2019年2月18日
人工智能 | SCI期刊专刊信息3条
Call4Papers
5+阅读 · 2019年1月10日
大数据 | 顶级SCI期刊专刊/国际会议信息7条
Call4Papers
10+阅读 · 2018年12月29日
人工智能类 | 国际会议/SCI期刊专刊信息9条
Call4Papers
4+阅读 · 2018年7月10日
计算机类 | 期刊专刊截稿信息9条
Call4Papers
4+阅读 · 2018年1月26日
人工智能 | 国际会议/SCI期刊约稿信息9条
Call4Papers
3+阅读 · 2018年1月12日
【今日新增】计算机领域国际会议截稿信息
Call4Papers
9+阅读 · 2017年7月21日
Arxiv
34+阅读 · 2019年11月7日
Deep Learning for Deepfakes Creation and Detection
Arxiv
6+阅读 · 2019年9月25日
VIP会员
相关资讯
CCF推荐 | 国际会议信息6条
Call4Papers
9+阅读 · 2019年8月13日
CCF推荐 | 国际会议信息10条
Call4Papers
7+阅读 · 2019年5月27日
人工智能 | SCI期刊专刊/国际会议信息7条
Call4Papers
7+阅读 · 2019年3月12日
人工智能 | CCF推荐期刊专刊约稿信息6条
Call4Papers
5+阅读 · 2019年2月18日
人工智能 | SCI期刊专刊信息3条
Call4Papers
5+阅读 · 2019年1月10日
大数据 | 顶级SCI期刊专刊/国际会议信息7条
Call4Papers
10+阅读 · 2018年12月29日
人工智能类 | 国际会议/SCI期刊专刊信息9条
Call4Papers
4+阅读 · 2018年7月10日
计算机类 | 期刊专刊截稿信息9条
Call4Papers
4+阅读 · 2018年1月26日
人工智能 | 国际会议/SCI期刊约稿信息9条
Call4Papers
3+阅读 · 2018年1月12日
【今日新增】计算机领域国际会议截稿信息
Call4Papers
9+阅读 · 2017年7月21日
Top
微信扫码咨询专知VIP会员