[sbis_l] 5th CFP - Second Issue - ENIGMA - Brazilian Journal of Information Security and Cryptography

domingo, 31 de agosto de 2014
ENIGMA – Brazilian Journal of Information Security and Cryptography

Call for Papers (Second Issue)

Aim & Scope

ENIGMA – Brazilian Journal of Information Security and Cryptography – is a technical-scientific publication that aims at discussing theoretical aspect contributions and practical applications results in information security, cryptography and cyber defense as well as fundamental subjects in support of those issues.
This journal is directed to academia researchers, industry professionals, members of government and military organizations, and all people that have interest in the area of information security and cryptography in order to disseminate and share their new technologies, scientific discoveries and research contributions.
The creation of this periodical is due the necessity to solve a gap represented by the lack of a technical-scientific brazilian journal that emphasizes information security and cryptography. In this manner, ENIGMA – Brazilian Journal of Information Security and Cryptography – must provide this demand, publishing papers of high quality within the international state-of-the-art.
Therefore, ENIGMA – Brazilian Journal of Information Security and Cryptography – will fulfill this demand, and will publish state-of-art and original research papers and timely review articles on the theory, design, and evaluation of all aspects of information, network and system security.

Important Dates

Submission deadline: 30 September 2014
Authors notification: 06 February 2015
Camera ready version: 27 February 2015
Publishing: March 2015

Topics of Interest

Considering the goals presented above, ENIGMA – Brazilian Journal of Information Security and Cryptography - have the mission to publish original papers including (but not limited to) the following interest topics:

Authentication and Authorization
Anonymity and Privacy
Attacks on Information Systems
Attacks on Web Applications
Audit of Information Systems
Anti-Phishing, Anti-Spam, Anti-Fraud Techniques
Artificial Intelligence applied to Information Security
Biometrics in Security Systems
Combat Electronic Fraud
Computational Tools
Cryptographic Hash
Cryptographic Engineering
Cryptanalysis Methods
Critical Infrastructure Protection
Context-Based Security
Database Security
Digital Forensics
E cient Implementation of Cryptographic Algorithms
Ethical and Legal Implications
Formal Methods for Security
Firewall Evasion Techniques
Game Theory in Information Security
Hacking and Cybercrimes
Honeypots and Honeynets
Hardware Security
Hardware for Information Security
High Performance Computing in Information Security
Intrusion Detection and Prevention
Incident Detection and Response
Intellectual Property Protection
Language-Based Security
Large-scale Attacks and Defense
Malware Detection and Analysis
Network Vulnerabilities
Organizational Security Policies
Public Key Cryptography
Public key infrastructure
Performance Security Solutions
Patents, Standards and Security Norms
Quantum Computing applied to Information Security
Quantum and Post-Quantum Cryptography
Modeling and Simulation of Security Systems
Software Vulnerabilities
Symmetric Cryptography
Secure Multi-Party Computation
Secure Software Development
Security Patterns
Security Measures and Metrics
Security Risk Analysis
Security Protocols
Security in Operating Systems
Security in Service-Oriented Architecture
Security in Cloud Computing
Security in Mobile Communications
Trust Management and Reputation Systems
Validation, Verification, and Security Testing

Instructions for Authors

The papers must represent original contribution and can not be, previous published (or in parallel submission) in any journals, magazines or conferences – printed or electronic.
The submissions can be written in Portuguese, Spanish or English; but, in any case, the title, the abstract and the keywords MUST be in English. The submission must be in anonymous mode, without author names, a liation, acknowledgement, or any other obvious reference to the authors.
All papers should be in PDF format, according to the standard IEEE Transactions (MS Word or LATEX) and size is from 6 to 12 pages long. Papers should be submitted to ENIGMA Journal through following email address: enigmajournal.org@gmail.com. Late submission shall not be accepted. The Journal's website (http://www.enigmajournal.org) is still under construction.

Editors

Editor-in-Chief
Eduardo Takeo Ueda

Associate Editor-in-Chief
Mirela Sechi Moretti Annoni Notare

Editorial Board

André Luiz Moura dos Santos (UECE, Brazil)
Carlos Alberto Maziero (UTFPR, Brazil)
Denise Hideko Goya (UFABC, Brazil)
Eduardo James Pereira Souto (UFAM, Brazil)
Eduardo Martins Guerra (INPE, Brazil)
Leonardo Barbosa e Oliveira (UFMG, Brazil)
Raul FernandoWeber (UFRGS, Brazil)
Ruy José Guerra Barretto de Queiroz (UFPE, Brazil)
Rafael Rodrigues Obelheiro (UDESC, Brazil)
Rafael Timóteo de Sousa Júnior (UnB, Brazil)

First Issue (September 2014)


Accepted Papers:

Unconditionally Secure Quantum Communications via Decoherence-Free Subspaces
Authors: Elloá B. Guedes and Francisco M. de Assis

Revocation of User Certificates in a Military Ad Hoc Network
Authors: Jorma Jormakka and Henryka Jormakka

Synthetic Steganographic Series and Finance
Authors: Philip C. Ritchey and Vernon J. Rego

Securing Automation Systems against Malware Intrusion
Authors: Robert Fitz and Wolfgang A. Halang

Invited Papers:


Isomorphism Theorem and Cryptology
Authors: Roberto Lins de Carvalho and Flávio Luis de Mello

Harnessing Nature's Randomness: Physical Random Number Generator
Author: Geraldo A. Barbosa

QC-MDPC McEliece: an Optimized Implementation of a New McEliece Variant
Authors: Homero de O. Martins and A. C. A. Nascimento

Securing Web Applications: Techniques and Challenges
Author: Marco Vieira

Best Paper of "Congreso Iberoamericano de Seguridad Informática (CIBSI) 2013":


Diseño de un Conjunto de Herramientas Software para Ataques por Canal Lateral
Authors: Alberto F. Rodríguez, Luis H. Encinas, Agustín M. Muñoz and Bernardo A. Alcázar

Best Paper of "Taller Iberoamericano de Enseñanza e Innovación Educativa en Seguridad de la Información (TIBETS) 2013":

Contenido de Seguridad en el Grado de Informática Acorde a las Certificaciones Profesionales
Authors: David G. Rosado, Luis E. Sanchez, Daniel Mellado, Eduardo Fernández-Medina

Support

Defense Ministry of Brazil / Center of Cyber Defense

--
--
----------------------------------------------------------
Seja associado da SBIS!
Visite o site www.sbis.org.br

---
Você recebeu essa mensagem porque está inscrito no grupo quot;Sociedade Brasileira de Informática em Saúde - Lista de Discussão" dos Grupos do Google.
Para cancelar inscrição nesse grupo e parar de receber e-mails dele, envie um e-mail para sbis_l+unsubscribe@googlegroups.com.
Para mais opções, acesse https://groups.google.com/d/optout.

0 comentários: