<div dir="ltr"><p style="font-family:arial,sans-serif;font-size:14px;text-align:justify"><span lang="EN-US"><span style="text-align:start">[ Apologies if you receive multiple copies of this call.]</span><br></span></p><p style="font-family:arial,sans-serif;font-size:14px;text-align:justify"><span lang="EN-US">With the great success of 2G/3G mobile networks and the fast development of 4G, the phase of 5th generation mobile networks or 5th generation wireless systems (in short 5G) is coming. 5G, aiming to offer a big data bandwidth and infinite capability of networking, will bring brilliant user experiences on mobile communications and multimedia sharing.</span></p><p style="font-family:arial,sans-serif;font-size:14px;text-align:justify"><span lang="EN-US">Beyond 4G, the major difference of 5G is much more than increased <a href="http://en.wikipedia.org/wiki/Maximum_throughput" title="Maximum throughput" target="_blank"><span style="color:windowtext;text-decoration:none">maximum throughput</span></a>. Considering the current technical advance including massive dense networks, interference and mobility management, Internet of Things (IoT), pervasive and social computing, mobile ad hoc networks (MANET), cognitive radio, cloud computing and so on, what will the 5G look at? What is the perspective of 5G security and trust? Some experts commented that 5G will definitely apply and benefit from the above technologies. However, integrating existing advanced technologies and innovating new techniques for 5G could introduce tremendous challenges on security and trust.</span></p><p style="font-family:arial,sans-serif;font-size:14px;text-align:justify"><span lang="EN-US">This special issue aims at providing a forum to discuss the perspective of 5G security and trust, explore 5G security strategies and investigate technologies for securing 5G and managing 5G trust.<a name="14896edd9358dd90__GoBack" style="color:rgb(34,34,34)"></a> </span><span lang="FI">Topics of interest of this special issue include, but are not limited to:</span><span lang="EN-US"></span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">5G security and trust requirements</span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">Security architecture of 5G</span><span lang="EN-US" style="font-size:12pt"></span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">Trust management framework for 5G</span><span lang="EN-US" style="font-size:12pt"></span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">5G communication and networking security</span><span lang="EN-US" style="font-size:12pt"></span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">Privacy preservation and enhancement in 5G</span><span lang="EN-US" style="font-size:12pt"></span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">Intrusion detection and content access control in 5G</span><span lang="EN-US" style="font-size:12pt"></span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">Trust management in heterogeneous 5G networks</span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">5G identity management and its trustworthiness</span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">Intelligent 5G security provision</span><span lang="EN-US" style="font-size:12pt"></span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-right:3.1pt;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">Trust collaboration in 5G</span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">User trust in 5G</span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">IoT security and trust in 5G</span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt;font-family:Symbol">·<span style="font-size:7pt;font-family:&#39;Times New Roman&#39;">         </span></span><span lang="EN-US" style="font-size:12pt">(Mobile) cloud computing trust management in 5G</span></p><p style="font-family:arial,sans-serif;font-size:14px"><b><span lang="FI">Submission</span></b><span lang="FI"></span></p><p class="MsoNormal" style="font-family:arial,sans-serif;font-size:14px"><span lang="EN-US" style="font-size:12pt">Concerning the preparation of manuscripts, please refer to the “Author Guidelines” page at the journal website,<a href="http://onlinelibrary.wiley.com/journal/10.1002/%28ISSN%291939-0122/homepage/ForAuthors.html" target="_blank">http://onlinelibrary.wiley.com/journal/10.1002/%28ISSN%291939-0122/homepage/ForAuthors.html</a>. Manuscripts must be submitted through the online submission system: <a href="http://mc.manuscriptcentral.com/scn" target="_blank">http://mc.manuscriptcentral.com/scn</a> by selecting the corresponding track. When submitting papers, authors should identify “Manuscript Type” as “Special Issue”, and enter “Running Head” and “Special Issue Title” as “SCN-SI-75” and “5G Security and Trust,” respectively. Contributing authors might also be asked to review some of the papers submitted to this special issue. All papers will be rigorously reviewed based on quality: original, high scientific quality, well organized and clearly written, sufficient support for assertions and conclusions, appropriate title, abstract includes important points of the paper, satisfactory presentation in English, pertinent references, clear tables, and figures.</span></p><p style="font-family:arial,sans-serif;font-size:14px"><b><span lang="FI">Time Schedule</span></b><span lang="FI"></span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">Manuscript Due: October 30th, 2014</span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">First Round Notification: December 30th, 2014</span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">First Revision Due: January 31st, 2015</span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">Acceptance Notification: March 15th, 2015</span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">Final Manuscript Due: April 1st, 2015</span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">Publication Date: 2015 (TBA)</span></p><p style="font-family:arial,sans-serif;font-size:14px"><b><span lang="FI">Guest Editors</span></b><span lang="FI"></span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">Zheng Yan</span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">Xidian University, China</span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">E-mail: <a href="mailto:zyan@xidian.edu.cn" target="_blank">zyan@xidian.edu.cn</a></span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">Robert H. Deng</span></p><p style="font-family:arial,sans-serif;font-size:14px;margin-left:17.85pt"><span lang="EN-US" style="font-size:12pt"></span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">Singapore Management University, Singapore</span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">Email: <a href="mailto:robertdeng@smu.edu.sg" target="_blank"><span style="color:windowtext;text-decoration:none">robertdeng@smu.edu.sg</span></a></span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">Athanasios V. Vasilakos,</span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">University of Western Macedonia, Greece</span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI"></span></p><p style="font-family:arial,sans-serif;font-size:14px"><span lang="FI">Email: <a href="mailto:vasilako@ath.forthnet.gr" target="_blank"><span style="color:windowtext;text-decoration:none">vasilako@ath.forthnet.gr</span></a></span></p></div>