Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    IJS 2012 - CFP - International Journal of Security (IJS)

    View: 521

    Website http://www.cscjournals.org/csc/journals/IJS/description.php?JCode=IJS | Want to Edit it Edit Freely

    Category IJS 2012

    Deadline: November 30, 2011 | Date: February 15, 2012

    Venue/Country: Kuala Lumpur, Malaysia

    Updated: 2011-10-25 21:34:56 (GMT+9)

    Call For Papers - CFP

    Computer Science Journals (CSC Journals) invites researchers, editors, scientists & scholars to publish their scientific research papers in an International Journal of Security (IJS) Volume 6, Issue 1.

    Information Security is an important aspect of protecting the information society from a wide variety of threats. The International Journal of Security (IJS) presents publications and research that builds on computer security and cryptography and also reaches out to other branches of the information sciences. Our aim is to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.

    IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. It is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. We welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.

    CSC Journals anticipate and invite papers on any of the following topics:

    Access control and audit

    Anonymity

    Anonymity and pseudonymity

    Attacks, security mechanisms, and security service

    Authentication

    Authorisation

    Biometrics

    Cellular/wireless/mobile/satellite networks securi

    Code security, including mobile code security

    Computer forensics

    Confidentiality, privacy, integrity, authenticatio

    Cryptography and cryptanalysis

    Data confidentiality issues

    Data integrity issues

    Data recovery

    Database security

    Denial of service

    Denial of service attacks and countermeasures

    Dependability and reliability

    Design or analysis of security protocols

    Distributed access control

    Distributed and parallel systems security

    Electronic commerce

    Formal security analyses

    Fraudulent usage

    Information flow

    Information hiding and watermarking

    Intellectual property protection

    Intrusion detection

    Key management

    Multicast security

    Network and Internet security

    Network forensics

    Network security performance evaluation

    Non-repudiation

    Peer-to-peer security

    Prevention of traffic analysis

    Privacy protection

    Public key cryptography and key management

    Revocation of malicious parties

    Risk assessment and management

    Secure location determination

    Secure PHY/MAC/routing protocols

    Secure routing protocols

    Security group communications

    Security in ad hoc networks

    Security in cellular networks (2G, 2.5G, 3G, B3G,

    Security in communications

    Security in content-delivery networks

    Security in distributed systems

    Security in domain name service

    Security in e-mail

    Security in high-speed networks

    Security in integrated networks

    Security in integrated wireless networks

    Security in internet and WWW

    Security in IP networks

    Security in mobile IP

    Security in optical systems and networks

    Security in peer-to-peer networks

    Security in satellite networks

    Security in sensor networks

    Security in VoIP

    Security in wired and wireless integrated networks

    Security in Wired Networks

    Security in wireless communications

    Security in wireless internet

    Security in wireless LANs (IEEE 802.11 WLAN, WiFi,

    Security in wireless MANs (IEEE 802.16 and WiMAX)

    Security in wireless PANs (Bluetooth and IEEE 802.

    Security policies

    Security specification techniques

    Security standards

    Tradeoff analysis between performance and security

    Trust establishment

    Viruses worms and other malicious code

    WLAN and Bluetooth security

    Important Dates - IJS CFP - Volume 6, Issue 1.

    Paper Submission: November 30, 2011

    Author Notification: January 01, 2012

    Issue Publication: February 2012

    For complete details about IJS archives publications, abstracting/indexing, editorial board and other important information, please refer to IJS homepage.

    We look forward to receive your valuable papers. If you have further questions please do not hesitate to contact us at cscpressatcscjournals.org. Our team is committed to provide a quick and supportive service throughout the publication process.


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.