IJS 2012 - CFP - International Journal of Security (IJS)
View: 521
Website http://www.cscjournals.org/csc/journals/IJS/description.php?JCode=IJS |
Edit Freely
Category IJS 2012
Deadline: November 30, 2011 | Date: February 15, 2012
Venue/Country: Kuala Lumpur, Malaysia
Updated: 2011-10-25 21:34:56 (GMT+9)
Call For Papers - CFP
Computer Science Journals (CSC Journals) invites researchers, editors, scientists & scholars to publish their scientific research papers in an International Journal of Security (IJS) Volume 6, Issue 1.Information Security is an important aspect of protecting the information society from a wide variety of threats. The International Journal of Security (IJS) presents publications and research that builds on computer security and cryptography and also reaches out to other branches of the information sciences. Our aim is to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. It is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. We welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.CSC Journals anticipate and invite papers on any of the following topics: Access control and audit Anonymity Anonymity and pseudonymity Attacks, security mechanisms, and security service Authentication Authorisation Biometrics Cellular/wireless/mobile/satellite networks securi Code security, including mobile code security Computer forensics Confidentiality, privacy, integrity, authenticatio Cryptography and cryptanalysis Data confidentiality issues Data integrity issues Data recovery Database security Denial of service Denial of service attacks and countermeasures Dependability and reliability Design or analysis of security protocols Distributed access control Distributed and parallel systems security Electronic commerce Formal security analyses Fraudulent usage Information flow Information hiding and watermarking Intellectual property protection Intrusion detection Key management Multicast security Network and Internet security Network forensics Network security performance evaluation Non-repudiation Peer-to-peer security Prevention of traffic analysis Privacy protection Public key cryptography and key management Revocation of malicious parties Risk assessment and management Secure location determination Secure PHY/MAC/routing protocols Secure routing protocols Security group communications Security in ad hoc networks Security in cellular networks (2G, 2.5G, 3G, B3G, Security in communications Security in content-delivery networks Security in distributed systems Security in domain name service Security in e-mail Security in high-speed networks Security in integrated networks Security in integrated wireless networks Security in internet and WWW Security in IP networks Security in mobile IP Security in optical systems and networks Security in peer-to-peer networks Security in satellite networks Security in sensor networks Security in VoIP Security in wired and wireless integrated networks Security in Wired Networks Security in wireless communications Security in wireless internet Security in wireless LANs (IEEE 802.11 WLAN, WiFi, Security in wireless MANs (IEEE 802.16 and WiMAX) Security in wireless PANs (Bluetooth and IEEE 802. Security policies Security specification techniques Security standards Tradeoff analysis between performance and security Trust establishment Viruses worms and other malicious code WLAN and Bluetooth securityImportant Dates - IJS CFP - Volume 6, Issue 1.Paper Submission: November 30, 2011 Author Notification: January 01, 2012 Issue Publication: February 2012 For complete details about IJS archives publications, abstracting/indexing, editorial board and other important information, please refer to IJS homepage.We look forward to receive your valuable papers. If you have further questions please do not hesitate to contact us at cscpress
cscjournals.org. Our team is committed to provide a quick and supportive service throughout the publication process.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.