posted by user: mazdak || 9029 views || tracked by 11 users: [display]

SISC-TS 2013 : Special Issue on Secure Communications - Telecommunication Systems (Springer Journal; ISI Impact Factor 1.02)

FacebookTwitterLinkedInGoogle

Link: http://www.springer.com/?SGWID=0-102-2-1358921-preview&dynamic=true
 
When N/A
Where N/A
Submission Deadline Dec 31, 2013
Categories    computer   communications   security   IT
 

Call For Papers

Special Issue on Secure Communications - Telecommunication Systems (Springer Journal; ISI Impact Factor 1.02)


Telecommunication Systems
Modeling, Analysis, Design and Management
Editor-in-Chief: Bezalel Gavish
ISSN: 1018-4864 (print version)
ISSN: 1572-9451 (electronic version)
Journal no. 11235
ISI Impact Factor 1.02


Special Issue on Secure Communications

Secure communication is when two entities are communicating and do not want a third party to listen in. For that they need to communicate in a way not susceptible to eavesdropping or interception. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what was said. Other than spoken face-to-face communication with no possible eavesdropper, it is probably safe to say that no communication is guaranteed secure in this sense, although practical obstacles such as legislation, resources, technical issues (interception and encryption), and the sheer volume of communication serve to limit surveillance.
With many communications taking place over long distance and mediated by technology, and increasing awareness of the importance of interception issues, technology and its compromise are at the heart of this debate. For this reason, this special issue focuses on communications mediated or intercepted by technology. Trusted Computing also is an approach under present development that achieves security in general at the potential cost of compelling obligatory trust in corporate and government bodies.

Topics
Security can be broadly categorized under the following headings, with examples:
 Hiding the content or nature of a communication
o Code – a rule to convert a piece of information (for example, a letter, word, phrase, or gesture) into another form or representation (one sign into another sign), not necessarily of the same type. In communications and information processing, encoding is the process by which information from a source is converted into symbols to be communicated. Decoding is the reverse process, converting these code symbols back into information understandable by a receiver.
o Encryption
o Identity Based
o Steganography covers a broad spectrum of techniques, which include, among others:
 Digital Image Steganography - allows an average user to securely transfer text messages by hiding them in a digital image file.
 Digital Audio Steganography - based on the characteristics of digital audio signals and the human auditory system (HAS).
 Digital Video Steganography - embed small information in the digital video such that the message is imperceptible and robust against attempts to degrade it or remove it from the digital object.
 Steganalysis - The goal of steganalysis is to identify suspected packages, determine whether or not they have a payload encoded into them, and, if possible, recover that payload.

 Hiding the parties to a communication – preventing identification, promoting anonymity
o Crowds and similar anonymous group structures – it is difficult to identify who said what when it comes from a "crowd"
o Anonymous communication devices – unregistered cell phones, Internet cafes
o Anonymous proxies
o Hard to trace routing methods – through unauthorized third-party systems, or relays

 Hiding the fact that a communication takes place
o Security by obscurity – similar to needle in a haystack
o Random traffic – creating random data flow to make the presence of genuine communication harder to detect and traffic analysis less reliable


Submissions
 The manuscripts for this special issue have to be submitted in the form of a PDF file ONLY to the Corresponding Guest Editor - Dr. Mazdak Zamani (mazdak@utm.my) and NOT to the journal office.
 Guidelines for preparation of the manuscripts are provided at the Telecommunication Systems journal website, http://www.springer.com/journal/11235.
 The submission must include the title, abstract of your paper, and all the authors' names, affiliations and emails.
 All papers will be rigorously reviewed based on the quality: originality, high scientific quality, organization and clarity of writing, and support provided for assertions and conclusion.


Schedule
 Submission Deadline: December 31, 2013
 Notification of First Round of Review: March 31, 2014
 Submission of Revised Papers for Second Round of Review: April 30, 2014
 Notification of Second Round of Review: June 30, 2014
 Submission of Final Paper: July 31, 2014
 Publication Date (Hard Copy): 2017/2018 (Tentative)


Guest Editors
Prof. Dr. Azizah Abd Manaf
Universiti Teknologi Malaysia
54100 Kuala Lumpur, Malaysia
E-mail: azizah07@ic.utm.my

Assoc. Prof. Dr. Isao Echizen
National Institute of Informatics
2-1-2, Hitotsubashi, Chiyoda-ku, Tokyo, Japan
E-mail: iechizen@nii.ac.jp

Dr. Mazdak Zamani
Universiti Teknologi Malaysia
54100 Kuala Lumpur, Malaysia
E-mail: mazdak@utm.my

Prof. Dr. Shamsul Sahibuddin
Universiti Teknologi Malaysia
54100 Kuala Lumpur, Malaysia
E-mail: shamsul@utm.my

Prof. Dr. Yoshiro Imai
Kagawa University
2217-20 Hayashi-cho Takamatsu, Japan
E-mail: imai@eng.kagawa-u.ac.jp

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
ICSNC 2025   The Twentieth International Conference on Systems and Networks Communications
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
NeurIPS 2025   Annual Conference on Neural Information Processing Systems
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICAUAS 2025   2025 International Conference on Advanced Unmanned Aerial Systems (ICAUAS 2025)
IEEE-Ei/Scopus-CWCBD 2025   2025 6th International Conference on Wireless Communications and Big Data (CWCBD 2025) -EI Compendex
MEAP 2024   7th International Conference on Mechanical Engineering & Applications
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
MSEJ 2024   Advances in Materials Science and Engineering: An International Journal