Call for Papers: Security and Privacy in New Computing Environments


The existing computing paradigms and computing environments have evolved rapidly owing to the great developments and advancements in sensing, computing and communication technology coupled with the cyberspace-based supporting technologies such as edge computing, cloud computing, Internet-of-Things (IoT), blockchain, metaverse and other mobile computing environments. For example, IoT is being adopted in more and more real-world applications and is devoted to make "Everything Smart" like smart wearables, home automation, smart health, smart manufacturing, smart transportation and even smart city. While considerable attention has been given to addressing IoT security and privacy issues, many questions are left unresolved. What’s more, with the reduction of the price and volume of IoT devices, and accordingly growing application of IoT devices, we are bound to see an increase in the number of security and privacy issues.

Besides, as a promising decentralized transaction and data management technology, blockchain illustrates a good potential to lay new foundations for our socio-economic systems by effectively building trust among people/machines, lowering cost in companies/organizations, and increasing utilization of resources. In recent years, we have seen an ever-growing research interest in this field, and the main reason is its essential properties that provide security, anonymity, and data integrity without any third-party organization in control of the transactions. On the other hand, its advancement should be further equipped with better privacy, scalability, efficiency, and higher flexibility for mobile networks and applications.

This special issue aims to bring together contributions from researchers and practitioners working in the security and privacy of the above-mentioned new computing environments for mobile networks and applications. We seek high-quality articles presenting state-of-the-art security and privacy research.


Topics of interest include, but are not limited to, the following scope:

  • Access Control in New Computing Environments
  • Authentication in New Computing Environments
  • Identity and access management in IoT
  • Mobile Cloud Computing Security
  • Security and Privacy in Big Data
  • New Cryptographic Techniques for New Computing Environments
  • Security and Privacy in Blockchain
  • Security and Privacy in IoT
  • Measurement of IoT privacy leakage
  • Privacy enhancing technologies for New Computing Environments

Important Dates

  • Manuscript submission deadline: 30 October 2022
  • Notification of acceptance: 30 December 2022
  • Submission of final revised paper: 1 February 2023
  • Publication of special issue (tentative): per journal policy

Submission Procedure

Authors should follow the MONET Journal manuscript format described at the journal site. Manuscripts should be submitted on-line through

Guest Editors:

Ding Wang
Nankai University, China

Prof. Ding Wang focuses on Digital identity security and Password-based authentication. Password-based authentication is the most popular method for user authentication. He has been involved in the community as a PC Chair/TPC member for over 70 international conferences such as ACM CCS 2022, PETS 2022, ACSAC 2021/2020, ACM AsiaCCS 2021, IEEE CNS 2020, IFIP SEC 2018-2021, INSCRYPT 2018-2020, and SPNCE 2020-2022. He has received the "ACM China Outstanding Doctoral Dissertation Award", the Best Paper Award at INSCRYPT 2018, and the First Prize of Natural Science Award of Ministry of Education. he has published more than 60 papers at venues like IEEE S&P ACM CCS, NDSS, Usenix Security, IEEE TDSC, and IEEE TIFS. His research has been reported by over 200 medias like Daily Mail, Forbes, IEEE Spectrum and Communications of the ACM, appeared in the Elsevier 2017 "Article Selection Celebrating Computer Science Research in China", and resulted in the revision of the authentication guideline NIST SP800-63-2.

Home page:  

Qi Jiang
Xidian University, China

Prof. Qi Jiang focuses on cryptographic protocols, which is a promising method for tackling security issues and is becoming more and more popular. He has been involved in the community as a TPC member and a reviewer for over 40 international conferences and journals. His works appear in prestigious venues like Computer Networks, IET Information Security, IEEE Trans. Veh. Technol, IEEE Systems Journal, Journal of Network and Computer Applications, and thirteen of them are selected as ``ESI highly cited papers''. He was recognized as “Highly Cited Chinese Researchers” by Elsevier at 2021. 

Home page:

Weizhi Meng
Technical University of Denmark, Denmark

Prof. Weizhi Meng  is currently an Associate Professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark (DTU), Kongens Lyngby, Denmark.

He focuses on biometric authentication, which plays an important role in user authentication as well as mobile authentication. He has served as a program committee member for more than 50 international conferences. He was a PC chair for many conferences such as IEEE Blockchain 2018, IEEE ATC 2019, IFIPTM 2019, SocialSec 2019, ICICS 2020, Globecom (CISS) 2020, IEEE DSC 2021, CSS 2021. He is the Chair of IEEE Young Professionals Affinity Group - Denmark Section. He has also served as a Guest Editor for IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (TII), Future Generation Computer Systems (FGCS), Journal of Information Security and Applications (JISA), Sensors, Computer Applications in Engineering Education (CAEE), International Journal of Distributed Sensor Networks (IJDSN), Security and Communication Networks (SCN), Digital Communications and Networks (DCN), and Wireless Communications and Mobile Computing (WCMC). He is an ACM Distinguished Speaker, a senior member of IEEE and a senior member of ACM. He was a recipient of the Hong Kong Institution of Engineers (HKIE) Outstanding Paper Award for Young Engineers/Researchers in 2014 and 2017.

Home page:

Working on a manuscript?

Avoid the most common mistakes and prepare your manuscript for journal editors.

Learn more