The Scientific World Journal

Recent Advances in Information Security


Publishing date
23 May 2014
Status
Published
Submission deadline
14 Mar 2014

Lead Editor

1Peoples’ Friendship University of Russia, Moscow, Russia

2Feng Chia University, Taichung, Taiwan

3King Saud University, Riyadh, Saudi Arabia

4China University of Mining and Technology, Xuzhou, China

5University of Novi Sad, Novi Sad, Serbia


Recent Advances in Information Security

Description

Recent years have witnessed rapid developments of the information communication technology and the next-generation Internet. We have seen the potential and value for new technologies from a variety of digital networks to various interconnected digital devices, which make it possible to realize the ubiquitous network and society. But, in such environment, copyright infringement behaviors, such as illicit copying, malicious distribution, unauthorized usage, and free sharing of copyright-protected digital contents, will also become a much more common phenomenon. Researchers, content industry engineers, and administrators attempt to resort to the state-of-the-art technologies and ideas to protect valuable digital contents and services assets against attacks and IP piracy in the emerging ubiquitous network.

This special issue aims to bring together related research works in the realm of ubiquitous network and multimedia contents security and further investigates and discusses trusted solutions and secure techniques for ubiquitous network as well as some open issues faced by digital contents owners/rights holders/multimedia services providers, who dedicate themselves to protect their intellectual property rights and business benefits. In addition, novel ideas and research works from end consumers’ perspective, such as privacy, trustworthiness, and multimedia contents sharing in ubiquitous network society, will be embraced by the special issue. Potential topics include, but are not limited to:

  • Access control
  • Cloud computing security
  • Computer forensics
  • Cryptography and applications
  • Data and system integrity
  • Database security
  • Electronic commerce security
  • Information discovery
  • Information hiding
  • Intrusion detection
  • Network security
  • Operating system security
  • Public key cryptosystems
  • Public key infrastructure
  • Security issues in the Internet of things
  • Software security

Before submission authors should carefully read over the journal’s Author Guidelines, which are located at http://www.hindawi.com/journals/tswj/guidelines/. Prospective authors should submit an electronic copy of their complete manuscript through the journal Manuscript Tracking System at http://mts.hindawi.com/submit/journals/tswj/communications/rai/ according to the following timetable:


Articles

  • Special Issue
  • - Volume 2014
  • - Article ID 235837
  • - Research Article

Reducing Side Effects of Hiding Sensitive Itemsets in Privacy Preserving Data Mining

Chun-Wei Lin | Tzung-Pei Hong | Hung-Chuan Hsu
  • Special Issue
  • - Volume 2014
  • - Article ID 816549
  • - Research Article

A Complete Hierarchical Key Management Scheme for Heterogeneous Wireless Sensor Networks

Chien-Ming Chen | Xinying Zheng | Tsu-Yang Wu
  • Special Issue
  • - Volume 2014
  • - Article ID 604876
  • - Research Article

Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload

Zhaoxia Yin | Bin Luo | Wien Hong
  • Special Issue
  • - Volume 2014
  • - Article ID 463912
  • - Research Article

A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects

Hui He | Dongyan Zhang | ... | Dongmin Gao
  • Special Issue
  • - Volume 2014
  • - Article ID 268592
  • - Research Article

Identifying Network Public Opinion Leaders Based on Markov Logic Networks

Weizhe Zhang | Xiaoqiang Li | ... | Xing Wang
  • Special Issue
  • - Volume 2014
  • - Article ID 650537
  • - Research Article

On the Improvement of Wiener Attack on RSA with Small Private Exponent

Mu-En Wu | Chien-Ming Chen | ... | Hung-Min Sun
  • Special Issue
  • - Volume 2014
  • - Article ID 283639
  • - Research Article

Novel Image Encryption Scheme Based on Chebyshev Polynomial and Duffing Map

Borislav Stoyanov | Krasimir Kordov
  • Special Issue
  • - Volume 2014
  • - Article ID 751845
  • - Research Article

Privacy-Preserving Location-Based Query Using Location Indexes and Parallel Searching in Distributed Networks

Cheng Zhong | Lei Liu | Jing Zhao
The Scientific World Journal
 Journal metrics
See full report
Acceptance rate15%
Submission to final decision115 days
Acceptance to publication14 days
CiteScore3.900
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.