Advanced Security Technologies and Services for Future Computing Environments

The objectives of this special issue are advanced security technologies and services for future computing environments, including, but not limited to, security primitives, protocols and security applications and services. Recent advances in security technologies and services for future computing environments have created a new class of the following: (i) Wireless sensor networks and radiofrequency identification security and privacy; (ii) security architectures for distributed network systems, P2P systems, cloud and grid systems; and (iii) security in e-commerce, mobile and wireless networks, and finally, security standards and assurance methods. All papers are expected to focus on novel approaches for advanced security technologies and services for future computing environments and to present high-quality results for tackling problems arising from the ever-growing advanced security technologies and services for future computing environments.

[1]  Andreu Pere Isern-Deyà,et al.  A Secure Automatic Fare Collection System for Time-Based or Distance-Based Services with Revocable Anonymity for Users , 2013, Comput. J..

[2]  Serge Vaudenay,et al.  On Selecting the Nonce Length in Distance-Bounding Protocols , 2013, Comput. J..

[3]  Thierry Ernst,et al.  IPv6 Security Issues in Cooperative Intelligent Transportation Systems , 2013, Comput. J..

[4]  Kangchan Lee Security Threats in Cloud Computing Environments , 2012 .

[5]  R. Sumathi,et al.  A Survey of QoS Based Routing Protocols for Wireless Sensor Networks , 2012, J. Inf. Process. Syst..

[6]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[7]  Mohsen Guizani,et al.  A Two-Step Secure Localization for Wireless Sensor Networks , 2013, Comput. J..

[8]  Hsiao-Hwa Chen,et al.  Selecting key management schemes for WSN applications , 2012, Comput. Secur..

[9]  Han-Chieh Chao,et al.  Using GHZ-State for Multiparty Quantum Secret Sharing Without Code Table , 2013, Comput. J..

[10]  U Varshney,et al.  Mobile and Wireless Networks. , 2000 .

[11]  Jianping Wu,et al.  MBST: Detecting Packet-Level Traffic Anomalies by Feature Stability , 2013, Comput. J..

[12]  Yang Xiao,et al.  Security co-existence of wireless sensor networks and RFID for pervasive computing , 2008, Comput. Commun..

[13]  Doo-Soon Park,et al.  Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering , 2013, J. Inf. Process. Syst..