CALL FOR CHAPTER PROPOSALS Proposal Submission Deadline: October 30, 2008 Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering A book edited by Dr. Hamid R. Nemati and Dr. Li Yang The University of North Carolina at Greensboro and University of Tennessee at Chattanooga Introduction Cryptography provides the most efficient services for defending against threats in cyber space and holds great promise as the technology to provide security, especially when security becomes one of the top concerns for businesses worldwide. The security of a system is decided by the weakest link and the real-world constraints make the cryptography much less effective than they are in a purely mathematical world. The cryptography in real-world networks and systems has been less effective than cryptography as a mathematical science because of engineering discipline that converts the mathematical promise of cryptographic security into a reality of security. Building real-world cryptographic systems is different from the abstract theories of cryptography with only pure mathematics. Designers and implementers face real-world constraints which are experienced by most cryptographic systems. In order to achieve real-world security goals, cryptographic techniques should be applied in a real-world setting in order to build and engineer a secure cryptographic system. Therefore, there is a need to explore and investigate applied cryptography that bridges the gap between cryptographic theory and real-world cryptographic applications. Applied cryptography gives concrete advice about how to design, implement and evaluate cryptographic systems within real-world settings. Objective of the Book As applied cryptography becomes more demanding in information security and privacy, a resource about cryptography as an engineering discipline used to meet specific requirements is necessary. Therefore, this book will be written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements. This book will delve into the specific security requirements and opponents in various emerging application areas and discuss the procedure about engineering cryptography into system design and implementation. To engineer cryptography into a real-world secure system requires the understanding of both real-world constraints of a specific area and mastering of cryptographic algorithms and techniques. This book will be about building a secure system in real settings, which is the essence of applied cryptography in information security and privacy. It will provide business professionals, college researchers, professors, students, or consultants with a general overview of how to engineer cryptography into a real-world system to secure information transmission, processing and storage, thus reducing threats of information security for businesses. Target Audience The target audience of this book will consist of professionals and researchers who are particularly interested in how cryptography is applied to information security and privacy and how cryptography provides defense for organizations in a variety of areas including networks, email, e-commerce, databases, and management. This book will be useful to: - Business Professionals/ISA Management and Staff Anyone in business who deals with security and assurance of information (managers, project leaders, ISA staff) and anyone who designs and implements security policies should consider the real-world constraints, potential opponents, cryptographic algorithms and implementation guidelines described in this book. - University Information System and Security Faculty and Students Faculty and students can use this book to learn the context and application of cryptography in traditional and emerging fields because applied cryptography bridges cryptography as mathematical theories with its real-world settings. - ISA Product/Service Vendors and Consultants Vendors and consultants specializing in information security, network security and privacy can benefit from the book's industry overview, current industry snapshot, organizational and technical challenges, and trends impacting future direction of applied cryptography. Recommended topics include, but are not limited to, the following: Applied Cryptography using quantum computing Applied Cryptography in Network Security Applied Cryptography in Wireless Networks Applied Cryptography in E-mail Service and Web Services Applied Cryptography in Electronic Commerce Applied Cryptography in Regulations and Compliance Applied Cryptography in Personal and Pervasive Computing Applied Cryptography in Database Security and Privacy Applied Cryptography in Hardware Architecture Future Trends of Applied Cryptography Submission Procedure Researchers and practitioners are invited to submit on or before October 30, 2008, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. Authors of accepted proposals will be notified by November 15, 2008 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by February 15, 2009. All submitted chapters will be reviewed on a double-blind review basis. This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference) and "Medical Information Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com <http://www.igi-pub.com> . Inquiries and submissions can be forwarded electronically (Word document) to: Dr. Hamid R. Nemati ISOM Dept., Bryan School of Business and Economics The University of North Carolina at Greensboro P.O. Box 26165, Greensboro, NC 27402-6165 e-mail: Hamid_Nemati@uncg.edu and Dr. Li Yang Department of Computer Science and Engineering The University of Tennessee at Chattanooga 615 McCallie Avenue Chattanooga, TN 37403-2598 e-mail: Li-Yang@utc.edu