Logo Goletty

Editorial
Journal Title Journal of Communications
Journal Abbreviation jcm
Publisher Group Academy Publisher
Website http://ojs.academypublisher.com
PDF (128 kb)
   
Title Editorial
Authors Chen, Wen; Yu, Fei; Chang, Chin-Chen; Zeng, Jiexian; Yue, Guangxue
Abstract This special issue comprises six selected papers from the International Symposium on Information Science and Engineering 2008 (ISISE 2008) and International Symposium on Computer Sciences and Computational Technology 2008 (ISCSCT 2008), held in Shanghai, China, 20-22 December 2008. A total of more than 2000 contributions were submitted to the two Conferences, of which 600 were selected for presentation after a rigorous review process. From these 600 research papers, the guest editors selected six as the best papers on the communications track of the Conferences. The authors of these selected papers produced extended versions of their conference papers, which were further developed through two rounds of reviewing. “TTEM: An Effective Trust-Based Topology Evolution Mechanism for P2P Networks”, by Jianli Hu, Quanyuan Wu, and Bin Zhou, presents a feedback credibility based global trust model, and based on the trust model, proposes an adaptive topology evolution mechanism for unstructured P2P networks. Through this mechanism, trusted peers can migrate to the centric position, while untrusted peers to the edge of the topology, guaranteeing fairness during topology evolution. The mechanism can suppress the malicious behaviors of peers effectively, and also has the incentive effect on all peers. In “SimANet – A Large Scalable, Distributed Simulation Framework for Ambient Networks”, Matthias Vodel, Matthias Sauppe, Mirko Caspar, and Wolfram Hardt present a new simulation platform for complex, radio standard spanning mobile Ad Hoc networks. The presented SimANet - Simulation Platform for Ambient Networks - allows the coexistence of multiple radio modules with different communication technologies and protocol stacks within one node, which can be used concurrently. “Cryptanalysis of Some RFID Authentication Protocols”, by Tianjie Cao, Peng Shen, and Elisa Bertino, identifies two effective attacks, namely impersonation attack and de-synchronization attack, against the LCSS protocol and the Song-Mitchell RFID authentication protocol. The authors also identify an impersonation attack against another newly proposed RFID authentication scheme. It is recommended that these attacks should be considered in the designing the new RFID authentication protocol. In “How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme”, Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang, and Guowen Li address the problem of how to construct forward secure single-server, multi-server and threshold-server assisted signature schemes using Bellare-Miner Scheme, and propose three corresponding signature schemes. It has been proved in the paper that, these three schemes maintain the forward secure property. “Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures”, by Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, and Guowen Li, proposes a publicly verifiable member-join protocol for threshold signatures, in which, a new member can join a PVSS scheme to share the secret only with the help of old shareholders. Moreover, everyone besides the new member can verify the validity of the new member’s share, while only the new member knows his share. The proposed protocol can tolerate a mobile adversary and adapts to many electronic applications. In the last paper “Secure and Distributed P2P Reputation Management”, Jianli Hu, Quanyuan Wu, and Bin Zhou proposes a reputation based secure and distributed P2P global trust management model (DSRM), and presents its corresponding distributed storage mechanism and security protection protocol. Theoretical analysis and simulation experiments show that, DSRM has advantages in combating various malicious behaviors such as ordinary malicious behaviors and collusions, and suppressing the sybil attackers and trust information tamper peers in transmission over the current global trust management models, and demonstrates more robustness and effectiveness. In closing, we would like to take this opportunity to thank the authors for the efforts they put in the preparation of the manuscripts and in keeping the deadlines set by editorial requirements. We wish to express our deepest thanks to the program committee members for their help in selecting papers for this issue and especially the referees of the extended versions of the selected papers for their thorough reviews under a tight time schedule. We also acknowledge the exceptional effort by the Editorial Board of the Journal of Communications throughout this process. We hope that you will enjoy reading this special issue as much as we did putting it together.
Publisher ACADEMY PUBLISHER
Date 2008-12-01
Source Journal of Communications Vol 3, No 7 (2008): Special Issue: Recent Advances in Information Technology and Security - Track o
Rights Copyright © ACADEMY PUBLISHER - All Rights Reserved.To request permission, please check out URL: http://www.academypublisher.com/copyrightpermission.html. 

 

See other article in the same Issue


Goletty © 2024