Fwd: [tciin] CFP: IEEE Communications Magazine - Feature Topic on “Security and Privacy in Emerging Networks”
-------- Weitergeleitete Nachricht -------- Betreff: [tciin] CFP: IEEE Communications Magazine - Feature Topic on “Security and Privacy in Emerging Networks” Datum: Tue, 16 Sep 2014 01:55:19 +0000 Von: Sammy Chan eeschan@cityu.edu.hk An: tciin.isat@u-bourgogne.fr tciin.isat@u-bourgogne.fr
*Apologies if you have received multiple copies of this email.
*/ /*
*/IEEE Communications Magazine/*
*CALL FOR PAPERS*
*Feature Topic on *
*“Security and Privacy in Emerging Networks”*
With recent advancements in networking technologies, some new emerging networks are being deployed that have the potential to be deployed broadly and at large scale in the near future. In the wired domain, these emerging networks include networks based on software-defined networking (SDN) and named-data-networking (NDN). In the wireless domain, they include mobile and wireless networks involving handheld computing devices, sensors and RFID devices, body area sensor networks, and participatory sensing networks.
Although these emerging networks have attracted much research effort, the security and privacy issues of these networks need more attention. This feature topic aims to promote further research interest in security and privacy in emerging networks by providing a vehicle for researchers and practitioners to discuss research challenges and open issues, and disseminate their latest research results.
*Topics include (but are not limited to):*
* Named data networking security and privacy * Software defined networking security and privacy * Novel security methods using software defined networking * Body area sensor networking security and privacy * Security of incremental deployment * Security and privacy of participatory sensing networks * Practical implementations of cryptographic protocols in emerging networks * Threat and vulnerability analysis for emerging networks * Economics of emerging network security * Cross-layer design for security and privacy in emerging networks * Denial of service in emerging networks * Authentication and access control in emerging networks * Emerging and needed standards in emerging network security
SUBMISSION GUIDELINES
Articles should be tutorial in nature and should be written in a style comprehensible and accessible to readers outside the specialty of the field. Authors must follow the /IEEE Communications Magazine's/ guidelines for preparation of their manuscripts. Complete guidelines for prospective authors can be found at http://www.comsoc.org/commag/paper-submission-guidelines.
It is very important to note that the IEEE Communications Magazine strongly limits mathematical content, and the number of figures and tables. Paper length should not exceed 4,500 words. Authors should submit their manuscripts in PDF format electronically via Manuscript Central (http://mc.manuscriptcentral.com/commag-ieee). Select "April 2015/Security in Emerging Networks" as the submission category.
IMPORTANT DATES
* *Manuscript Submission Due:* October 1, 2014 * *Acceptance Notification:* December 1, 2014 * *Final Manuscript Due:* February 1, 2015 * *Publication Date:* April 2015
GUEST EDITORS
*Mohsen Guizani*, Qatar University, Qatar (mguizani@ieee.org mailto:mguizani@ieee.org)
*Daojing He, *South China University of Technology, China (hedaojinghit@gmail.com mailto:hedaojinghit@gmail.com)
*Kui Ren*, University at Buffalo, State University of New York, USA (kuiren@buffalo.edu mailto:kuiren@buffalo.edu)
*Joel Rodrigues*, University of Beira Interior, Portugal (joeljr@ieee.org mailto:joeljr@ieee.org)
*Sammy Chan, *City University of Hong Kong, Hong Kong SAR (eeschan@cityu.edu.hk mailto:eeschan@cityu.edu.hk)
*Yan Zhang*, Simula Research Laboratory, Norway (yanzhang@simula.no mailto:yanzhang@simula.no)
Disclaimer: This email (including any attachments) is for the use of the intended recipient only and may contain confidential information and/or copyright material. If you are not the intended recipient, please notify the sender immediately and delete this email and all copies from your system. Any unauthorized use, disclosure, reproduction, copying, distribution, or other form of unauthorized dissemination of the contents is expressly prohibited.
participants (1)
-
Lars Wolf