Brazilian Journal of Information Security and Cryptography Call for Papers Aim & Scope

ENIGMA – Brazilian Journal of Information Security and Cryptography – is a technical-scientific publication that aims at discussing theoretical aspect contributions and practical applications results in information security, cryptography and cyber defense as well as fundamental subjects in support of those issues. This journal is directed to academia researchers, industry professionals, members of government and military organizations, and all people that have interest in the area of information security and cryptography in order to disseminate and share their new technologies, scientific discoveries and research contributions. The creation of this periodical is due the necessity to solve a gap represented by the lack of a technical-scientific brazilian journal that emphasizes information security and cryptography. In this manner, ENIGMA – Brazilian Journal of Information Security and Cryptography – must provide this demand, publishing papers of high quality within the international state-of-the-art. Therefore, ENIGMA – Brazilian Journal of Information Security and Cryptography – will fulfill this demand, and will publish state-of-art and original research papers and timely review articles on the theory, design, and evaluation of all aspects of information, network and system security.

Important Dates

Second Issue Submission deadline: 30 September 2014 Authors notification: 06 February 2015 Camera ready version: 27 February 2015 Publishing: March 2015

Topics of Interest

Considering the goals presented above, ENIGMA – Brazilian Journal of Information Security and Cryptography - have the mission to publish original papers including (but not limited to) the following interest topics: Authentication and Authorization Anonymity and Privacy Attacks on Information Systems

Attacks on Web Applications Audit of Information Systems Anti-Phishing, Anti-Spam, Anti-Fraud Techniques Artificial Intelligence applied to Information Security Biometrics in Security Systems Combat Electronic Fraud Computational Tools Cryptographic Hash Cryptographic Engineering Cryptanalysis Methods Critical Infrastructure Protection Context-Based Security Database Security Digital Forensics Efficient Implementation of Cryptographic Algorithms Ethical and Legal Implications Formal Methods for Security Firewall Evasion Techniques Game Theory in Information Security Hacking and Cybercrimes Honeypots and Honeynets Hardware Security Hardware for Information Security High Performance Computing in Information Security Intrusion Detection and Prevention Incident Detection and Response Intellectual Property Protection Language-Based Security Large-scale Attacks and Defense Malware Detection and Analysis Network Vulnerabilities Organizational Security Policies Public Key Cryptography Public key infrastructure Performance Security Solutions Patents, Standards and Security Norms Quantum Computing applied to Information Security Quantum and Post-Quantum Cryptography Modeling and Simulation of Security Systems Software Vulnerabilities Symmetric Cryptography Secure Multi-Party Computation Secure Software Development Security Patterns Security Measures and Metrics

Security Risk Analysis Security Protocols Security in Operating Systems Security in Service-Oriented Architecture Security in Cloud Computing Security in Mobile Communications Trust Management and Reputation Systems Validation, Verification, and Security Testing

Unconditionally Secure Quantum Communications via Decoherence-Free Subspaces Authors: Elloá B. Guedes and Francisco M. de Assis

Revocation of User Certificates in a Military Ad Hoc Network Authors: Jorma Jormakka and Henryka Jormakka

Synthetic Steganographic Series and Finance Authors: Philip C. Ritchey and Vernon J. Rego

Securing Automation Systems against Malware Intrusion Instructions for Authors

Authors: Robert Fitz and Wolfgang A. Halang

Invited Papers: The papers must represent original contribution and can not be, previous published (or in parallel submission) in any journals, magazines or conferences – printed or electronic. The submissions can be written in Portuguese, Spanish or English; but, in any case, the title, the abstract and the keywords MUST be in English. The submission must be in anonymous mode, without author names, affiliation, acknowledgement, or any other obvious reference to the authors. All papers should be in PDF format, according to the standard IEEE Transactions (MS Word or LATEX) and size is from 6 to 12 pages long. Papers should be submitted to ENIGMA Journal through following email address: [email protected]. Late submission shall not be accepted. The Journal’s website (http://www.enigmajournal.org) is still under construction.

Editors

Isomorphism Theorem and Cryptology Authors: Roberto Lins de Carvalho and Flávio Luis de Mello

Harnessing Nature’s Randomness: Number Generator

Physical Random

Author: Geraldo A. Barbosa

QC-MDPC McEliece: an Optimized Implementation of a New McEliece Variant Authors: Homero de O. Martins and Anderson C. A. Nascimento

Securing Web Applications: Techniques and Challenges Author: Marco Vieira

Best Paper of “Congreso Iberoamericano de Seguridad Informática (CIBSI) 2013”: Diseño de un Conjunto de Herramientas Software para Ataques por Canal Lateral Authors: Alberto F. Rodríguez, Luis H. Encinas, Agustín M. Muñoz and Bernardo A. Alcázar

Editor-in-Chief Eduardo Takeo Ueda Associate Editor-in-Chief Mirela Sechi Moretti Annoni Notare Editorial Board

André Luiz Moura dos Santos (UECE, Brazil) Carlos Alberto Maziero (UTFPR, Brazil) Denise Hideko Goya (UFABC, Brazil) Eduardo James Pereira Souto (UFAM, Brazil) Eduardo Martins Guerra (INPE, Brazil) Leonardo Barbosa e Oliveira (UFMG, Brazil) Raul Fernando Weber (UFRGS, Brazil) Ruy José Guerra Barretto de Queiroz (UFPE, Brazil) Rafael Rodrigues Obelheiro (UDESC, Brazil) Rafael Timóteo de Sousa Júnior (UnB, Brazil)

Best Paper of “Taller Iberoamericano de Enseñanza e Innovación Educativa en Seguridad de la Información (TIBETS) 2013”: Contenido de Seguridad en el Grado de Informática Acorde a las Certificaciones Profesionales Authors: David G. Rosado, Luis E. Sanchez, Daniel Mellado, Eduardo Fernández-Medina

Support

Defense Ministry of Brazil

Center of Cyber Defense First Issue (September 2014)

Accepted Papers:

Brazilian Journal of Information Security and ... -

All papers should be in PDF format, according to the standard IEEE Transactions (MS Word or LATEX) and size is from 6 to 12 pages long. Papers should be.

213KB Sizes 0 Downloads 131 Views

Recommend Documents

Design and Implementation of the Brazilian Information System on ...
archive, and analyze data on spatial and temporal distribution of species along with information about their surrounding environment [1–2]. It is also important to ...

Information Security and Acceptable Use Security Policy.pdf ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Information ...

NETWORK SECURITY & CRYPTOGRAPHY - International Journal of ...
IJRIT International Journal of Research in Information Technology, Volume 2 .... These security breaches could also result in monetary losses of a large degree.

NETWORK SECURITY & CRYPTOGRAPHY - International Journal of ...
knowledge of the internet, its vulnerabilities, attack methods through the internet, and security ... Current development in network security hardware and software.

man-99\international-journal-of-information-technology-and ...
... more apps... Try one of the apps below to open or edit this item. man-99\international-journal-of-information-technology-and-knowledge-management.pdf.

nanofiltration - International Journal of Research in Information ...
Abstract- The term “membrane filtration” describes a family of separation methods.The basic principle is to use semi-permeable membranes to separate fluids, Gases, particles and solutes. Membranes are usually shaped as a thin film, which allows t

Software - International Journal of Research in Information ...
approach incorporates the elements of specification-driven, prototype-driven process methods, ... A prototype is produced at the end of the risk analysis phase.

man-82\international-journal-of-information-technology-and ...
Try one of the apps below to open or edit this item. man-82\international-journal-of-information-technology-and-knowledge-management-ijitkm.pdf.

Information Security and Acceptable Use Security Policy.pdf ...
Page 2 of 15. Published 6/30/2016 2. Information Security Office. Education - Partnership - Solutions. District organizational expectations for responsible use of ...

Encyclopedia of Information Ethics and Security - Semantic Scholar
Information technology--Moral and ethical aspects--Encyclopedias. 3. Computer crimes- .... ing state, which do not require any degree of mental effort as ...

Download Information Security Policies and Procedures: A ...
Edition: Guidelines for Effective Information. Security Management Full Books. Books detail ... Digital Computer Electronics · The Toyota Way: 14 ... Cissp: Certified Information Systems Security Professional Study Guide, Seventh Edition ...

PDF Download Healthcare Information Privacy and Security ...
PDF Download Healthcare Information Privacy ... that include: * Identity and access management systems * Proper application design * Physical and.