CALL FOR CHAPTER PROPOSALS

 

Proposal Submission Deadline: October 30, 2008

Applied Cryptography for Cyber Security and Defense:

Information Encryption and Cyphering

A book edited by Dr. Hamid R. Nemati and Dr. Li Yang

The University of North Carolina at Greensboro and University of Tennessee at Chattanooga

 

Introduction

Cryptography provides the most efficient services for defending against threats in cyber space and holds great promise as the technology to provide security, especially when security becomes one of the top concerns for businesses worldwide.  The security of a system is decided by the weakest link and the real-world constraints make the cryptography much less effective than they are in a purely mathematical world. The cryptography in real-world networks and systems has been less effective than cryptography as a mathematical science because of engineering discipline that converts the mathematical promise of cryptographic security into a reality of security.   Building real-world cryptographic systems is different from the abstract theories of cryptography with only pure mathematics.  Designers and implementers face real-world constraints which are experienced by most cryptographic systems. In order to achieve real-world security goals, cryptographic techniques should be applied in a real-world setting in order to build and engineer a secure cryptographic system. Therefore, there is a need to explore and investigate applied cryptography that bridges the gap between cryptographic theory and real-world cryptographic applications. Applied cryptography gives concrete advice about how to design, implement and evaluate cryptographic systems within real-world settings. 

 

Objective of the Book

As applied cryptography becomes more demanding in information security and privacy, a resource about cryptography as an engineering discipline used to meet specific requirements is necessary.  Therefore, this book will be written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements.  This book will delve into the specific security requirements and opponents in various emerging application areas and discuss the procedure about engineering cryptography into system design and implementation.  To engineer cryptography into a real-world secure system requires the understanding of both real-world constraints of a specific area and mastering of cryptographic algorithms and techniques.  This book will be about building a secure system in real settings, which is the essence of applied cryptography in information security and privacy. It will provide business professionals, college researchers, professors, students, or consultants with a general overview of how to engineer cryptography into a real-world system to secure information transmission, processing and storage, thus reducing threats of information security for businesses. 

 

Target Audience

The target audience of this book will consist of professionals and researchers who are particularly interested in how cryptography is applied to information security and privacy and how cryptography provides defense for organizations in a variety of areas including networks, email, e-commerce, databases, and management.  This book will be useful to: 

-        Business Professionals/ISA Management and Staff

Anyone in business who deals with security and assurance of information (managers, project leaders, ISA staff) and anyone who designs and implements security policies should consider the real-world constraints, potential opponents, cryptographic algorithms and implementation guidelines described in this book.

-        University Information System and Security Faculty and Students  

Faculty and students can use this book to learn the context and application of cryptography in traditional and emerging fields because applied cryptography bridges cryptography as mathematical theories with its real-world settings.

 

-        ISA Product/Service Vendors and Consultants

Vendors and consultants specializing in information security, network security and privacy can benefit from the book’s industry overview, current industry snapshot, organizational and technical challenges, and trends impacting future direction of applied cryptography. 

 

Recommended topics include, but are not limited to, the following:

Applied Cryptography using quantum computing

Applied Cryptography in Network Security

Applied Cryptography in Wireless Networks

Applied Cryptography in E-mail Service and Web Services

Applied Cryptography in Electronic Commerce

Applied Cryptography in Regulations and Compliance

Applied Cryptography in Personal and Pervasive Computing

Applied Cryptography in Database Security and Privacy

Applied Cryptography in Hardware Architecture

Future Trends of Applied Cryptography

 

Submission Procedure

Researchers and practitioners are invited to submit on or before October 30, 2008, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by November 15, 2008 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by February 15, 2009. All submitted chapters will be reviewed on a double-blind review basis. This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the “Information Science Reference” (formerly Idea Group Reference) and “Medical Information Science Reference” imprints. For additional information regarding the publisher, please visit www.igi-global.com.

 

Inquiries and submissions can be forwarded electronically (Word document) to:

Dr. Hamid R. Nemati

ISOM Dept., Bryan School of Business and Economics

The University of North Carolina at Greensboro

P.O. Box 26165, Greensboro, NC 27402-6165

e-mail: Hamid_Nemati@uncg.edu

and

Dr. Li Yang

Department of Computer Science and Engineering

The University of Tennessee at Chattanooga

615 McCallie Avenue

Chattanooga, TN 37403-2598

e-mail:  Li-Yang@utc.edu