Special issue of computer communications on information and future communication security

نویسندگان

  • Jong Hyuk Park
  • Sheikh Iqbal Ahamed
  • Willy Susilo
  • Michela Taufer
چکیده

Submission Guideline: All manuscripts and any supplementary material should be submitted through Elsevier Editorial System (EES). The authors must select “Communication Security” when they reach the “Article Type” step in the submission process. The EES website is located at http://ees.elsevier.com/comcom/. CALL FOR PAPERS Special Issue of Computer Communications on Information and Future Communication Security http://www.elsevier.com/locate/comcom

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...

متن کامل

Computer security in the future

Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Editorial: special issue on advances in security and privacy for future mobile communications

Without doubt, the advances in wireless communication technologies like 3G, WiFi, WiMax and the proliferation of mobile devices have enabled the realization of pervasive and intelligent environments for users to communicate with each other, interact with information processing devices, and acquire ubiquitously a plethora of mobile services through various types of wireless access networks. Unde...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Communications

دوره 34  شماره 

صفحات  -

تاریخ انتشار 2011