The present invention is directed to a secure communication network that enables multi-point to multi-point proxy communication over the network. The network employs a smart server that establishes a secure communication link with each of a plurality of smart client devices deployed on local client networks. Each smart client device is in communication with a plurality of agent devices. A plurality of remote devices can access the smart server directly and communicate with an agent device via the secure communication link between the smart server and one of the smart client devices. Some of the claimed and desired to be secured, Such thing can be described as follows like one or more of the agent devices are HTML compliant ,the server is located outside each of the local client networks and so on . Some of the Issues Affecting today’s Large Computer Networks such as Performance Degradation, Host Identification and Security Issues. These kind of issues, as broadly encompassing as they are, can be overwhelming for small- to mid-sized business to handle on their own. Leave it to IT Direct to help you design, deploy, and manage a large networking solution that’s right for your business. The main goal of this special issue is to provide therefore, it is intended that this invention not be limited to the particular implementation and method disclosed herein, but that the invention include all implementations falling within the scope of the appended claims.
Topics of interest include, but are not limited to the following:
Security & Privacy in Wired, Wireless, Mobile, Hybrid, Sensor, Ad Hoc networks
Network Intrusion Detection and Prevention, Firewalls, Packet Filters
Web and Systems Security
Distributed Denial of Service Attacks and Defenses
Circumvention and Anti-Censorship Technologies
Security & Isolation in Cloud, Data Center and Software-Defined Networks
Authentication Systems: Public Key Infrastructures, Key Management, Credential Management
Security & Privacy in Pervasive and Ubiquitous Computing, e.g., RFIDs
Anonymization and privacy in communication systems
Biometric authentication and identity management
Security & Privacy for Emerging Technologies: VoIP, Internet-of-Things, Social Networks
Availability of communications, survivability of networks in the presence of attacks
Key management and PKI for networks
Information-theoretic security
Security and privacy in cloud computing and federated cloud
Security and privacy in body area networks
Physical layer security methods, cross-layer methods for enhancing security
Secure routing, network management
Security and privacy in multi-hop wireless networks: ad hoc, mesh, sensor, vehicular and RFID networks
Usable security for networked computer systems
Vulnerability, exploitation tools, malware, botnet, DDoS attacks
Web, e-commerce, m-commerce, and e-mail security
Cognitive Radio Network
5G, 4G, LTE, LTE-Advanced, WLAN, WPAN
Security and privacy in single-hop wireless networks: Wi-Fi, Wi-Max
10月23日
2017
10月24日
2017
初稿截稿日期
初稿录用通知日期
终稿截稿日期
注册截止日期
留言