The Scientific World Journal

Recent Advances in Information Security


Publishing date
23 May 2014
Status
Published
Submission deadline
14 Mar 2014

Lead Editor

1Peoples’ Friendship University of Russia, Moscow, Russia

2Feng Chia University, Taichung, Taiwan

3King Saud University, Riyadh, Saudi Arabia

4China University of Mining and Technology, Xuzhou, China

5University of Novi Sad, Novi Sad, Serbia


Recent Advances in Information Security

Description

Recent years have witnessed rapid developments of the information communication technology and the next-generation Internet. We have seen the potential and value for new technologies from a variety of digital networks to various interconnected digital devices, which make it possible to realize the ubiquitous network and society. But, in such environment, copyright infringement behaviors, such as illicit copying, malicious distribution, unauthorized usage, and free sharing of copyright-protected digital contents, will also become a much more common phenomenon. Researchers, content industry engineers, and administrators attempt to resort to the state-of-the-art technologies and ideas to protect valuable digital contents and services assets against attacks and IP piracy in the emerging ubiquitous network.

This special issue aims to bring together related research works in the realm of ubiquitous network and multimedia contents security and further investigates and discusses trusted solutions and secure techniques for ubiquitous network as well as some open issues faced by digital contents owners/rights holders/multimedia services providers, who dedicate themselves to protect their intellectual property rights and business benefits. In addition, novel ideas and research works from end consumers’ perspective, such as privacy, trustworthiness, and multimedia contents sharing in ubiquitous network society, will be embraced by the special issue. Potential topics include, but are not limited to:

  • Access control
  • Cloud computing security
  • Computer forensics
  • Cryptography and applications
  • Data and system integrity
  • Database security
  • Electronic commerce security
  • Information discovery
  • Information hiding
  • Intrusion detection
  • Network security
  • Operating system security
  • Public key cryptosystems
  • Public key infrastructure
  • Security issues in the Internet of things
  • Software security

Before submission authors should carefully read over the journal’s Author Guidelines, which are located at http://www.hindawi.com/journals/tswj/guidelines/. Prospective authors should submit an electronic copy of their complete manuscript through the journal Manuscript Tracking System at http://mts.hindawi.com/submit/journals/tswj/communications/rai/ according to the following timetable:


Articles

  • Special Issue
  • - Volume 2014
  • - Article ID 562492
  • - Editorial

Recent Advances in Information Security

Fei Yu | Chin-Chen Chang | ... | Mirjana Ivanovic
  • Special Issue
  • - Volume 2014
  • - Article ID 281305
  • - Research Article

Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

Younsung Choi | Junghyun Nam | ... | Dongho Won
  • Special Issue
  • - Volume 2014
  • - Article ID 452362
  • - Research Article

Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

Anitha Vijaya Kumar | Akilandeswari Jeyapal
  • Special Issue
  • - Volume 2014
  • - Article ID 671038
  • - Research Article

Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

Yunchuan Guo | Lihua Yin | ... | Junyan Qian
  • Special Issue
  • - Volume 2014
  • - Article ID 983901
  • - Research Article

An Analysis of Security System for Intrusion in Smartphone Environment

Maya Louk | Hyotaek Lim | HoonJae Lee
  • Special Issue
  • - Volume 2014
  • - Article ID 101986
  • - Research Article

SmartMal: A Service-Oriented Behavioral Malware Detection Framework for Mobile Devices

Chao Wang | Zhizhong Wu | ... | Patrick C. K. Hung
  • Special Issue
  • - Volume 2014
  • - Article ID 725279
  • - Research Article

Quality of Protection Evaluation of Security Mechanisms

Bogdan Ksiezopolski | Tomasz Zurek | Michail Mokkas
  • Special Issue
  • - Volume 2014
  • - Article ID 232708
  • - Research Article

An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

Mang Su | Fenghua Li | ... | Bo Zhou
  • Special Issue
  • - Volume 2014
  • - Article ID 132713
  • - Research Article

Malware Analysis Using Visualized Image Matrices

KyoungSoo Han | BooJoong Kang | Eul Gyu Im
  • Special Issue
  • - Volume 2014
  • - Article ID 207457
  • - Research Article

Modeling the Propagation of Mobile Phone Virus under Complex Network

Wei Yang | Xi-liang Wei | ... | Yu Yao
The Scientific World Journal
 Journal metrics
Acceptance rate24%
Submission to final decision68 days
Acceptance to publication29 days
CiteScore2.900
Impact Factor-
 Submit

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.