Sign for Notice Everyday    注册| 登陆| 友情链接| English|

Our Sponsors


    IJS 2010 - International Journal of Security

    View: 889

    Website http://www.cscjournals.org/csc/home.php | Want to Edit it Edit Freely

    Category Security

    Deadline: September 30, 2010 | Date: October 01, 2010

    Venue/Country: Kuala Lumpur, Malaysia

    Updated: 2010-09-18 16:21:44 (GMT+9)

    Call For Papers - CFP

    Journal: International Journal of Security (IJS)

    Volume: 4 Issue: 5

    ISSN: 1985-2320

    URL: http://www.cscjournals.org/csc/description.php?JCode=IJS

    Important Dates

    Paper Submission: September 30 2010

    Author Notification: November 01, 2010

    Issue Publication: November / December 2010

    About IJS

    Information Security is an important aspect of protecting the information society from a wide variety of threats. The International Journal of Security (IJS) presents publications and research that builds on computer security and cryptography and also reaches out to other branches of the information sciences. Our aim is to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.

    IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. It is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. We welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.

    To build its International reputation, we are disseminating the publication information through Google Books, Google Scholar, Directory of Open Access Journals (DOAJ), Open J Gate, ScientificCommons, Docstoc and many more. Our International Editors are working on establishing ISI listing and a good impact factor for IJS.

    IJS List of Topics

    The realm of International Journal of Security (IJS) extends, but not limited, to the following:

    Anonymity and pseudonymity

    Attacks, security mechanisms, and security service

    Authentication

    Authorisation

    Biometrics

    Cellular/wireless/mobile/satellite networks securi

    Code security, including mobile code security

    Computer forensics

    Confidentiality, privacy, integrity, authenticatio

    Cryptography and cryptanalysis

    Data confidentiality issues

    Data integrity issues

    Data recovery

    Database security

    Denial of service

    Denial of service attacks and countermeasures

    Dependability and reliability

    Design or analysis of security protocols

    Distributed access control

    Distributed and parallel systems security

    Electronic commerce

    Formal security analyses

    Fraudulent usage

    Information flow

    Information hiding and watermarking

    Intellectual property protection

    Intrusion detection

    Key management

    Multicast security

    Network and Internet security

    Network forensics

    Network security performance evaluation

    Non-repudiation

    Peer-to-peer security

    Prevention of traffic analysis

    Privacy protection

    Public key cryptography and key management

    Revocation of malicious parties

    Risk assessment and management

    Secure location determination

    Secure PHY/MAC/routing protocols

    Secure routing protocols

    Security group communications

    Security in ad hoc networks

    Security in cellular networks (2G, 2.5G, 3G, B3G,

    Security in communications

    Security in content-delivery networks

    Security in distributed systems

    Security in domain name service

    Security in e-mail

    Security in high-speed networks

    Security in integrated networks

    Security in integrated wireless networks

    Security in internet and WWW

    Security in IP networks

    Security in mobile IP

    Security in optical systems and networks

    Security in peer-to-peer networks

    Security in satellite networks

    Security in sensor networks

    Security in VoIP

    Security in wired and wireless integrated networks

    Security in Wired Networks

    Security in wireless communications

    Security in wireless internet

    Security in wireless LANs (IEEE 802.11 WLAN, WiFi,

    Security in wireless MANs (IEEE 802.16 and WiMAX)

    Security in wireless PANs (Bluetooth and IEEE 802.

    Security policies

    Security specification techniques

    Security standards

    Tradeoff analysis between performance and security

    Trust establishment

    Viruses worms and other malicious code

    WLAN and Bluetooth security


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.