Special Section on Pervasive Multiparty Computing Technologies for Privacy and Network Security

Published 13 April, 2023


Multiparty computing is a reliable technique for evaluating functions collaboratively, without any party having access to the others' private inputs. Until recently, cryptographic operations had been the main means of achieving secure multiparty computation (SMC). However, this approach does not work for many real-time and online calculations due to the need for hardware enforcement, code separation, and data isolation. Trusted execution environments offer a promising path towards making SMC more accessible on any network. Furthermore, these environments are giving us the chance to reduce some of the security and privacy costs associated with broad multiparty computation.

The use of data analytics has become increasingly essential in many fields, including agriculture, bioinformatics, environmental research and Internet of Things (IoT) applications. With the emergence of semi-honest, malicious or covert attackers, the security and privacy of network communication must be safeguarded. Machine learning algorithms and artificial intelligence (AI) can help detect spam, viruses, data theft and hacking to improve overall security across ubiquitous networks. Meanwhile, the transfer of data between clouds also raises privacy issues. User's privacy may also be compromised if the data is leaked and improperly encrypted. To address these issues, stringent regulations must be implemented to ensure both ethical and legal commitments while not obstructing viable business models.

This special issue thoroughly examines the major issues and recent advancements in attack prediction and prevention, cyber threats, security concerns, legal and practical difficulties, together with other related areas. It will include a variety of research contributions that focus on real-world applications and examples.

Suggested topics include:

  • Attack prediction and prevention using machine learning algorithms
  • Smart sensors and multi agent pervasive networks
  • Green communication systems for intelligent networks
  • Security and privacy modeling in the cloud-based systems
  • Federated learning in digital healthcare using IoT
  • Secure architectures for smart cities using IoT
  • Intelligent and secure transportation systems
  • Transaction privacy leakage detection by data analytical models
  • Cyber threat intelligent models for the cloud-based system
  • Intelligent trust mechanisms for blockchain implementation
  • Big data analytics and IoT for sustainable development
  • Advanced signal processing algorithms for wireless communication

Submission Guidelines:

Unpublished manuscripts are welcome. All submissions must not be currently under review for publication elsewhere. Conference papers may be submitted only if the paper is completely re-written or substantially (70%) extended. For additional questions please contact the guest editors. All submitted papers will be peer reviewed using the normal standards of IJIN.

Before submission, authors should carefully read the journal's Author Guidelines available at http://www.keaipublishing.com/en/journals/international-journal-of-intelligent-networks/guide-for-authors/.

Selected authors will be invited to submit their through the journal's web submission tool at https://www.editorialmanager.com/IJIN/default.aspx by selecting “VSI: Pervasive Multiparty Computing Technologies ” from the “Issues” pull-down menu during the submission process.


  • Submission of manuscript: 31 August 2023
  • First notification: 30 October 2023
  • Final paper due: 30 November 2023
  • Publication: 30 December 2023

Guest Editors:

Editor 1 (Handling Editor)

  • Name: Dr. Sampathkumar Arumugam
  • Academic Position: Professor
  • Affiliation: Department of Applied Cybernetics, Faculty of Science, University of Hradec Kralove, Czech Republic.
  • Email: sampathkumar.arumugam@uhk.cz

Editor 2: 

  • Name: Dr. Badrul Hisham Ahmad
  • Academic Position: Professor
  • Affiliation: Faculty of Electronics and Computer Engineering, Universiti Teknikal Malaysia Melaka, Malaysia.
  • Email: badrulhisham@utem.edu.my

Editor 3: 

  • Name: Dr. Yong Shi
  • Academic Position: Associate Professor
  • Affiliation: Department of Computer Science, Kennesaw State University, Marietta, United States of America.
  • Email: yshi5@kennesaw.edu

Back to Call for Papers

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.