CALL FOR PAPERS - INTERNATIONAL JOURNAL OF SECURITY (IJS)
ISSN: 1985-2320
Volume 6, Issue 5
Info. at http://www.cscjournals.org/csc/journals/IJS/journal_cfp.php?JCode=IJS
Computer Science Journals (CSC Journals) invites researchers, editors, scientists & scholars to publish their scientific research papers in an International Journal of Security (IJS) Volume 6, Issue 5.
Information Security is an important aspect of protecting the information society from a wide variety of threats. The International Journal of Security (IJS) presents publications and research that builds on computer security and cryptography and also reaches out to other branches of the information sciences. Our aim is to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.
IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. It is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. We welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.
CSC Journals anticipate and invite papers on any of the following topics:
Access control and audit
Revocation of malicious parties
Anonymity
Risk assessment and management
Anonymity and pseudonymity
Secure location determination
Attacks, security mechanisms, and security service
Secure PHY/MAC/routing protocols
Authentication
Secure routing protocols
Authorisation
Security group communications
Biometrics
Security in ad hoc networks
Cellular/wireless/mobile/satellite
networks security
Security in cellular networks (2G, 2.5G, 3G, B3G,
Code security, including mobile code security
Security in communications
Computer forensics
Security in content-delivery networks
Confidentiality, privacy, integrity, authentication
Security in distributed systems
Cryptography and cryptanalysis
Security in domain name service
Data confidentiality issues
Security in e-mail
Data integrity issues
Security in high-speed networks
Data recovery
Security in integrated networks
Database security
Security in integrated wireless networks
Denial of service
Security in internet and WWW
Denial of service attacks and countermeasures
Security in IP networks
Dependability and reliability
Security in mobile IP
Design or analysis of security protocols
Security in optical systems and networks
Distributed access control
Security in peer-to-peer networks
Distributed and parallel systems security
Security in satellite networks
Electronic commerce
Security in sensor networks
Formal security analyses
Security in VoIP
Fraudulent usage
Security in wired and wireless integrated networks
Information flow
Security in Wired Networks
Information hiding and watermarking
Security in wireless communications
Intellectual property protection
Security in wireless internet
Intrusion detection
Security in wireless LANs (IEEE 802.11 WLAN, WiFi,
Key management
Security in wireless MANs (IEEE 802.16 and WiMAX)
Multicast security
Security in wireless PANs (Bluetooth and IEEE 802.
Network and Internet security
Security policies
Network forensics
Security specification techniques
Network security performance evaluation
Security standards
Non-repudiation
Tradeoff analysis between performance and security
Peer-to-peer security
Trust establishment
Prevention of traffic analysis
Viruses worms and other malicious code
Privacy protection
WLAN and Bluetooth security
Public key cryptography and key management
Important Dates - IJS CFP - Volume 6, Issue 5.
Paper Submission: September 30, 2012
Author Notification: November 15, 2012
Issue Publication: December 2012
For complete details about IJS archives publications, abstracting/indexing, editorial board and other important information, please refer to IJS homepage.
We look forward to receive your valuable papers. If you have further questions please do not hesitate to contact us at [log in to unmask] Our team is committed to provide a quick and supportive service throughout the publication process.
A complete list of journals can be found at http://www.cscjournals.org/csc/bysubject.php
|