Security in Ubiquitous Computing

A special issue of Computers (ISSN 2073-431X).

Deadline for manuscript submissions: closed (30 October 2013)

Special Issue Information

Dear Colleagues,

Security issues in ubiquitous, pervasive, or mobile computing have not only become a constant topic at relevant conferences, but begin to influence industry projects and product design. In addition to the standard security topics of cryptography, protocols, and authentication, the most important security issue in ubiquitous computing is user interaction: this includes human-computer interaction methods as well as systems design that considers the user in the loop. This special issue is concerned with all these and related topics and aims to publish mature work on security in ubiquitous, pervasive, or mobile computing.

René Mayrhofer
Guest Editor

Submission

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. Papers will be published continuously (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are refereed through a peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed Open Access published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. There will be no Article Processing Charge (APC) for publication in this special issue.

Keywords

  • security
  • cryptography
  • protocols
  • user authentication
  • device authentication
  • secure user interaction
  • device encryption
  • ubiquitous computing
  • mobile computing
  • Internet of things

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop