The Scientific World Journal

Recent Advances in Information Security


Publishing date
23 May 2014
Status
Published
Submission deadline
14 Mar 2014

Lead Editor

1Peoples’ Friendship University of Russia, Moscow, Russia

2Feng Chia University, Taichung, Taiwan

3King Saud University, Riyadh, Saudi Arabia

4China University of Mining and Technology, Xuzhou, China

5University of Novi Sad, Novi Sad, Serbia


Recent Advances in Information Security

Description

Recent years have witnessed rapid developments of the information communication technology and the next-generation Internet. We have seen the potential and value for new technologies from a variety of digital networks to various interconnected digital devices, which make it possible to realize the ubiquitous network and society. But, in such environment, copyright infringement behaviors, such as illicit copying, malicious distribution, unauthorized usage, and free sharing of copyright-protected digital contents, will also become a much more common phenomenon. Researchers, content industry engineers, and administrators attempt to resort to the state-of-the-art technologies and ideas to protect valuable digital contents and services assets against attacks and IP piracy in the emerging ubiquitous network.

This special issue aims to bring together related research works in the realm of ubiquitous network and multimedia contents security and further investigates and discusses trusted solutions and secure techniques for ubiquitous network as well as some open issues faced by digital contents owners/rights holders/multimedia services providers, who dedicate themselves to protect their intellectual property rights and business benefits. In addition, novel ideas and research works from end consumers’ perspective, such as privacy, trustworthiness, and multimedia contents sharing in ubiquitous network society, will be embraced by the special issue. Potential topics include, but are not limited to:

  • Access control
  • Cloud computing security
  • Computer forensics
  • Cryptography and applications
  • Data and system integrity
  • Database security
  • Electronic commerce security
  • Information discovery
  • Information hiding
  • Intrusion detection
  • Network security
  • Operating system security
  • Public key cryptosystems
  • Public key infrastructure
  • Security issues in the Internet of things
  • Software security

Before submission authors should carefully read over the journal’s Author Guidelines, which are located at http://www.hindawi.com/journals/tswj/guidelines/. Prospective authors should submit an electronic copy of their complete manuscript through the journal Manuscript Tracking System at http://mts.hindawi.com/submit/journals/tswj/communications/rai/ according to the following timetable:


Articles

  • Special Issue
  • - Volume 2014
  • - Article ID 480202
  • - Research Article

Fuzzy-Based Trust Prediction Model for Routing in WSNs

X. Anita | M. A. Bhagyaveni | J. Martin Leo Manickam
  • Special Issue
  • - Volume 2014
  • - Article ID 269357
  • - Research Article

Towards Dynamic Remote Data Auditing in Computational Clouds

Mehdi Sookhak | Adnan Akhunzada | ... | Nor Badrul Anuar
  • Special Issue
  • - Volume 2014
  • - Article ID 454867
  • - Research Article

Combining Digital Watermarking and Fingerprinting Techniques to Identify Copyrights for Color Images

Shang-Lin Hsieh | Chun-Che Chen | Wen-Shan Shen
  • Special Issue
  • - Volume 2014
  • - Article ID 547062
  • - Review Article

A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

Suleman Khan | Muhammad Shiraz | ... | Zulkanain Bin Abdul Rahman
  • Special Issue
  • - Volume 2014
  • - Article ID 632154
  • - Research Article

A Model Based Security Testing Method for Protocol Implementation

Yu Long Fu | Xiao Long Xin
  • Special Issue
  • - Volume 2014
  • - Article ID 602875
  • - Research Article

Calculating the Number of Cluster Heads Based on the Rate-Distortion Function in Wireless Sensor Networks

Mingxin Yang | Jingsha He | Yuqiang Zhang
  • Special Issue
  • - Volume 2014
  • - Article ID 950618
  • - Research Article

A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks

Jianhua Liu | Guangxue Yue | ... | Hongjie Li
  • Special Issue
  • - Volume 2014
  • - Article ID 589563
  • - Research Article

Countermeasures to Avoid Noncooperation in Fully Self-Organized VANETs

Jezabel Molina-Gil | Pino Caballero-Gil | Cándido Caballero-Gil
  • Special Issue
  • - Volume 2014
  • - Article ID 983862
  • - Research Article

A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching

Zhigang Chen | Jian Wang | ... | Xinxia Song
  • Special Issue
  • - Volume 2014
  • - Article ID 805856
  • - Research Article

Automating Risk Analysis of Software Design Models

Maxime Frydman | Guifré Ruiz | ... | Barton P. Miller
The Scientific World Journal
 Journal metrics
See full report
Acceptance rate15%
Submission to final decision115 days
Acceptance to publication14 days
CiteScore3.900
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.