Journal of Computer Security (JCS), Special Issue on Security of Ad Hoc and Sensor Networks, 2006 (Submission Due April 1, 2006) Guest editors: Peng Ning (NC State University) and Wenliang Du (Syracuse University) Ad hoc and sensor networks are expected to become an integral part of the future computing landscape. However, these networks introduce new security challenges due to their dynamic topology, severe resource constraints, and absence of a trusted infrastructure. This Journal of Computer Security (JCS) special issue seeks submissions from academia and industry presenting novel research on all aspects of security for ad hoc and sensor networks, as well as experimental studies of fielded systems. Topics of interest include, but are not limited to, the following as they relate to mobile ad hoc networks or sensor networks: - Security under resource constraints (e.g., energy, bandwidth, memory, and computation constraints) - Performance and security tradeoffs - Secure roaming across administrative domains - Key management - Cryptographic Protocols - Authentication and access control - Intrusion detection and tolerance - Trust establishment, negotiation, and management - Secure location services - Secure clock distribution - Privacy and anonymity - Secure routing - Secure MAC protocols - Denial of service - Prevention of traffic analysis For more information, please see http://discovery.csc.ncsu.edu/JCS-SASN06/