IJS 2010 - International Journal of Security
View: 889
Website http://www.cscjournals.org/csc/home.php |
Edit Freely
Category Security
Deadline: September 30, 2010 | Date: October 01, 2010
Venue/Country: Kuala Lumpur, Malaysia
Updated: 2010-09-18 16:21:44 (GMT+9)
Call For Papers - CFP
Journal: International Journal of Security (IJS)Volume: 4 Issue: 5ISSN: 1985-2320URL: http://www.cscjournals.org/csc/description.php?JCode=IJS
Important Dates Paper Submission: September 30 2010Author Notification: November 01, 2010Issue Publication: November / December 2010About IJSInformation Security is an important aspect of protecting the information society from a wide variety of threats. The International Journal of Security (IJS) presents publications and research that builds on computer security and cryptography and also reaches out to other branches of the information sciences. Our aim is to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems. IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. It is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. We welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.To build its International reputation, we are disseminating the publication information through Google Books, Google Scholar, Directory of Open Access Journals (DOAJ), Open J Gate, ScientificCommons, Docstoc and many more. Our International Editors are working on establishing ISI listing and a good impact factor for IJS.IJS List of TopicsThe realm of International Journal of Security (IJS) extends, but not limited, to the following:Anonymity and pseudonymityAttacks, security mechanisms, and security serviceAuthenticationAuthorisationBiometricsCellular/wireless/mobile/satellite networks securiCode security, including mobile code securityComputer forensicsConfidentiality, privacy, integrity, authenticatioCryptography and cryptanalysisData confidentiality issuesData integrity issuesData recoveryDatabase securityDenial of serviceDenial of service attacks and countermeasuresDependability and reliabilityDesign or analysis of security protocolsDistributed access controlDistributed and parallel systems securityElectronic commerceFormal security analysesFraudulent usageInformation flowInformation hiding and watermarkingIntellectual property protectionIntrusion detectionKey managementMulticast securityNetwork and Internet securityNetwork forensicsNetwork security performance evaluationNon-repudiationPeer-to-peer securityPrevention of traffic analysisPrivacy protectionPublic key cryptography and key managementRevocation of malicious partiesRisk assessment and managementSecure location determinationSecure PHY/MAC/routing protocolsSecure routing protocolsSecurity group communicationsSecurity in ad hoc networksSecurity in cellular networks (2G, 2.5G, 3G, B3G,Security in communicationsSecurity in content-delivery networksSecurity in distributed systemsSecurity in domain name serviceSecurity in e-mailSecurity in high-speed networksSecurity in integrated networksSecurity in integrated wireless networksSecurity in internet and WWWSecurity in IP networksSecurity in mobile IPSecurity in optical systems and networksSecurity in peer-to-peer networksSecurity in satellite networksSecurity in sensor networksSecurity in VoIPSecurity in wired and wireless integrated networksSecurity in Wired NetworksSecurity in wireless communicationsSecurity in wireless internetSecurity in wireless LANs (IEEE 802.11 WLAN, WiFi,Security in wireless MANs (IEEE 802.16 and WiMAX)Security in wireless PANs (Bluetooth and IEEE 802.Security policiesSecurity specification techniquesSecurity standardsTradeoff analysis between performance and securityTrust establishmentViruses worms and other malicious codeWLAN and Bluetooth security
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.