Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors

    Receive Latest News

    Feedburner
    Share Us


    JITST 2020 - Journal of Internet Technology and Secured Transactions

    View: 1314

    Website https://infonomics-society.org/jitst/ | Want to Edit it Edit Freely

    Category Internet Applications and Technology; Information Security; Cloud Security

    Deadline: September 01, 2020 | Date: October 01, 2020

    Venue/Country: U.K.

    Updated: 2020-05-13 05:03:57 (GMT+9)

    Call For Papers - CFP

    Call for Journal Papers - 2020

    Journal of Internet Technology and Secured Transactions

    https://infonomics-society.org/jitst/

    General:

    The Journal of Internet Technology and Secured Transactions (JITST) is a peer-reviewed and open-access journal. The JITST provides an international forum for electronic publication of high-quality scholarly papers in Internet Technology and Secured Transactions. The peer review process and publications in the JITST are free (no fees apply). All papers will be DOI enabled.

    The objectives of the JITST are to bridge the knowledge gap between academia and industry, and provide free access to current research work. We invite research papers that encompass conceptual analysis, design implementation and performance evaluation.

    Topics of interest include, but are not limited to:

    *Internet Applications and Technology

    - Application Agents

    - Artificial Intelligence and Expert Systems

    - Bitcoin

    - Blockchain

    - Boundary Issues of Internet Security

    - Broadband Access Technologies

    - Database Management

    - Data Models for Production Systems and Services

    - Defence Systems

    - Content-based Network Services

    - Embedded Systems

    - Internet Technologies

    - Internet Architecture

    - Internet of things

    - IPSec Quality of Service

    - Knowledge Management

    - Web Analytics

    *Information Security

    - Authentication Techniques

    - Biometrics

    - Chaos-based Data Security

    - Collaborative Learning

    - Cryptography

    - Cyber Security

    - Digital Forensics and Crimes

    - Ethical Hackers

    - Network Security Issues and Protocols

    - Organisation Considerations in Security Policy Formulation and Implementations

    - Security Challenges and Content Authoring

    - Secure Communications

    - MANET Security

    - Trust, Privacy and Data Security

    - Wireless Sensor Network Security

    *Ubi/Cloud Computing

    - Authentication and Access Control for Data Protection in Ubi/Cloud Computing

    - Context-Awareness and its Data Mining for UbiCom

    - Data Grids

    - Distributed Information Systems

    - Human-Computer Interface and Interaction for UbiCom

    - New Novel Mechanism and Application for Ubi/Cloud Computing

    - Peer to Peer Data Management

    - Smart Homes and its Business Model for UbiCom Service

    - Security and Data Management for UbiCom

    - Ubiquitous Systems

    - USN/RFID Service

    *Infonomics and e-Technology

    - e-Business

    - e-Commerce

    - e-Government

    - e-Learning

    - e-Society

    - Infonomics

    - Information Management

    - Information Quality

    - Information Visualization

    - Technology-Enabled Information

    - Synchronizing e-Security

    - System Design and Security for e-Services

    - Wearable

    *Multimedia and Web Services

    - Data center and Cloud Computing

    - Digital Economy and Blockchain

    - Intelligent Multimedia and Data Management

    - Multimedia Information Systems

    - Multimedia protocols

    - Multimedia Security

    - Online Social Networks (OSNs)

    - Semantic Web and Ontology

    - Social Business Intelligence

    - Social Media

    - Web Databases

    - Web Metrics and its Applications

    - Web Mining including Web Intelligence and Web 3.0.

    - Web Services

    - XML and other Extensible Languages

    *Cloud Security

    - Cloud Audit Protocol

    - Cloud Requirements for PaaS and SaaS

    - Cryptographic Enforcement of Multi-Tenancy

    - Secure Virtual Infrastructure and Private Cloud

    - Security Policy and Privacy Requirements

    Paper Submission Details

    Authors are invited to electronically submit original research contributions or

    experience reports in English.

    * The submitted manuscript must be submitted online at:

    https://infonomics-society.org/jitst/paper-submissions/

    * Author's Guidelines are available online at https://infonomics-society.org/jitst/author- guidelines/

    The review process will take between 4 to 6 weeks.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.