Abstract

The Future Generation Communication and Networking (FGCN) with advanced communication and networking environment is emerging for user centric consideration. In addition, the FGCN has emerged rapidly as an exciting new paradigm that includes ubiquitous, grid, and peer-to-peer computing to provide computing and communication services anytime and anywhere. Therefore, it is aim to provide users with more convenient and pleasurable services. While attack methods and tools have become more and more powerful, interest has greatly increased in the field of building, active and smart defense systems. Finding effective ways to protect information and data of FGCN environment is also a very challenging research problem. This Call for Papers attracted 32 submissions from Asia, Europe and the US covering a lot of topics in the field of the FGCN. Each paper was carefully evaluated by three reviewers. This careful evaluation process has allowed us to select 15 high quality research papers. Our special thanks go to Professor Ramjee Prasad (Editor-in-Chief) for his valuable support throughout the preparation of this Special Issue. We would like to thank all authors who have submitted papers to the Special Issue and in particular those whose papers have been accepted for this Special issue. Assistance from the editorial staff of the Wireless Personal Communications is also much appreciated. Finally, the Guest Editors wish to gratefully acknowledge all those who have generously given their time to review the papers submitted for consideration for this SI. The fifteen accepted papers are divided into three categories. Five papers relate toWireless or Vehicular Networks. “A Scalable Information Security Technique: Joint AuthenticationCoding Mechanism for Multimedia over Heterogeneous Wireless Networks” by Liang Zhou et al. discusses joint authentication coding for multimedia over wireless networks. “ImprovingWTLS Security forWAP basedMobile e-Commerce” by Yi-Jun He et al. tries to improve WTLS Security for WAP. “On Analyzing the Potential of a Layer-2 Multi-hop Authentication and Credential Delivery Scheme for Vehicular Communications” by Christian Tchepnda

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call