Journal Information
Wireless Communications and Mobile Computing (WCMC)
Impact Factor:

Call For Papers
Presenting comprehensive coverage of this fast moving field, Wireless Communications and Mobile Computing provides the R&D communities working in academia and the telecommunications and networking industries with a forum for sharing research and ideas.

The convergence of wireless communications and mobile computing is bringing together two areas of immense growth and innovation. This is reflected throughout the journal by strongly focusing on new trends, developments, emerging technologies and new industrial standards.

Under the guidance of an international editorial and advisory board drawn from academia and industry, this high quality, peer-reviewed journal, provides leading edge coverage of the opportunities and challenges driving the research and development of mobile communication systems.

All you need to stay ahead ...

    High calibre survey papers
    Written by leading experts in the wireless and networking communities.
    Rapid publication times
    Due to electronic review and submission of original research papers
    Special Issues
    Addressing key topics of interest and managed by high profile editors
    An international forum for the sharing of research and ideas
    Key topics presented by leading individuals at the cutting edge of new technologies. 
Last updated by Xin Yao in 2017-08-21
Special Issues
Special Issue on Rethinking Authentication on Smart Mobile Devices
Submission Date: 2018-04-13

Rapid advances in wireless technologies (e.g., LTE, LTE-A, WiMAX, 3G, Bluetooth, ZigBee, Z-Wave, and LoRaWAN) have partly contributed to the proliferation of smart mobile devices (e.g., sensors, vehicles, smart phones, and wearable devices). The amount and nature of communications and transactions on such devices require a secure and effective authentication mechanism to prevent unauthorized access from illegitimate entities (including both devices and users). Authentication, as a first line of defense, has been widely deployed to prevent unauthorized access and, in many cases, is also the primary line of defense. A large number of authentication mechanisms and schemes exist for conventional systems and may not be suitable for smart mobile computing paradigm. Firstly, smart mobile devices generally have limited computation and storage and energy capabilities (in comparison to personal computers and laptops), and thus authentication schemes that employ expensive cryptographic primitives will not be viable. Secondly, smart mobile devices are typically small devices with a small screen, keyboard, and so forth, and thus existing authentication schemes may not be sufficiently user-friendly. Thirdly, smart mobile devices often deal with very sensitive applications, activities, and data (e.g., location, preferences, and physical condition), and thus privacy demands are much more stringent than traditional authentication schemes. Consequently, it is necessary to perform a critical rethinking on authentication for smart mobile devices and promote new methods that are both robust and easy to use and minimize impact on the user's primary task. This special issue aspires to bring together contributions from researchers and practitioners working in the broad area of entity authentication. We seek high-quality articles presenting state-of-the-art authentication mechanisms, frameworks, protocols, algorithms, policies, user studies, and threat models for mobile computing environments. Potential topics include but are not limited to the following: -Mutual authentication on smart mobile devices -Group authentication on smart mobile devices -Anonymous authenti-ation on smart mobile devices -Implicit authentication on smart mobile devices -Evaluation metrics for authentication schemes on smart mobile devices -Foundational principles for authentication on smart mobile devices -Impact of authentication on a mobile user’s primary task -Surveys and comparisons of known authentication techniques for smart mobile devices -Existing authentication techniques applied in specific mobile applications -New paradigms for authentication on smart mobile devices -New lightweight cryptographic primitives for mobile authentication -New device to device authentication techniques for mobile environments -New user authentication techniques for mobile environments -Authentication for mobile cloud computing -Authentication for data aggregation on smart mobile devices -Attacks and challenges on authentication for smart mobile devices -Privacy enhancing technologies for authentication on smart mobile devices Authors can submit their manuscripts through the Manuscript Tracking System at Submission Deadline Friday, 13 April 2018 Publication Date August 2018 Papers are published upon acceptance, regardless of the Special Issue publication date. For more information, please see
Last updated by Dou Sun in 2017-10-04
Related Publications
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cWiCOMInternational Conference on Wireless Communications, Networking and Mobile Computing2016-05-10 2016-09-25
b3ICITInternational Conference on Industrial Technology2017-10-152017-11-112018-02-20
bb1PADLInternational Symposium on Practical Aspects of Declarative Languages2017-09-032017-10-092018-01-08
caa2LCNIEEE Conference on Local Computer Networks2017-04-102017-07-102017-10-09
bb2MUMInternational Conference on Mobile and Ubiquitous Multimedia2015-08-212015-10-092015-11-30
cINCInternational Network Conference2014-02-282014-03-282014-07-08
ICCIT''International Conference on Computer and Information Technology2017-12-152018-01-102018-05-03
ICCE'IEEE International Conference on Consumer Electronics2017-07-312017-09-052018-01-12
FMECInternational Conference on Fog and Mobile Edge Computing2017-12-152018-02-152018-04-23
ab1TPDLInternational Conference on Theory and Practice of Digital Libraries2015-03-202015-05-222015-09-14