Recent Advances in Information Security
1Peoples’ Friendship University of Russia, Moscow, Russia
2Feng Chia University, Taichung, Taiwan
3King Saud University, Riyadh, Saudi Arabia
4China University of Mining and Technology, Xuzhou, China
5University of Novi Sad, Novi Sad, Serbia
Recent Advances in Information Security
Description
Recent years have witnessed rapid developments of the information communication technology and the next-generation Internet. We have seen the potential and value for new technologies from a variety of digital networks to various interconnected digital devices, which make it possible to realize the ubiquitous network and society. But, in such environment, copyright infringement behaviors, such as illicit copying, malicious distribution, unauthorized usage, and free sharing of copyright-protected digital contents, will also become a much more common phenomenon. Researchers, content industry engineers, and administrators attempt to resort to the state-of-the-art technologies and ideas to protect valuable digital contents and services assets against attacks and IP piracy in the emerging ubiquitous network.
This special issue aims to bring together related research works in the realm of ubiquitous network and multimedia contents security and further investigates and discusses trusted solutions and secure techniques for ubiquitous network as well as some open issues faced by digital contents owners/rights holders/multimedia services providers, who dedicate themselves to protect their intellectual property rights and business benefits. In addition, novel ideas and research works from end consumers’ perspective, such as privacy, trustworthiness, and multimedia contents sharing in ubiquitous network society, will be embraced by the special issue. Potential topics include, but are not limited to:
- Access control
- Cloud computing security
- Computer forensics
- Cryptography and applications
- Data and system integrity
- Database security
- Electronic commerce security
- Information discovery
- Information hiding
- Intrusion detection
- Network security
- Operating system security
- Public key cryptosystems
- Public key infrastructure
- Security issues in the Internet of things
- Software security
Before submission authors should carefully read over the journal’s Author Guidelines, which are located at http://www.hindawi.com/journals/tswj/guidelines/. Prospective authors should submit an electronic copy of their complete manuscript through the journal Manuscript Tracking System at http://mts.hindawi.com/submit/journals/tswj/communications/rai/ according to the following timetable: