International Journal of Security (IJS)

full name / name of organization: 
Computer Science Journals (CSC Journals)
contact email: 
cfp@cscjournals.org

Computer Science Journals (CSC Journals) invites researchers, editors, scientists & scholars to publish their scientific research papers in an International Journal of Security (IJS) Volume 6, Issue 1.

Information Security is an important aspect of protecting the information society from a wide variety of threats. The International Journal of Security (IJS) presents publications and research that builds on computer security and cryptography and also reaches out to other branches of the information sciences. Our aim is to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.

IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. It is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. We welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.

CSC Journals anticipate and invite papers on any of the following topics:

Access control and audit

Anonymity

Anonymity and pseudonymity

Attacks, security mechanisms, and security service

Authentication

Authorisation

Biometrics

Cellular/wireless/mobile/satellite networks securi

Code security, including mobile code security

Computer forensics

Confidentiality, privacy, integrity, authenticatio

Cryptography and cryptanalysis

Data confidentiality issues

Data integrity issues

Data recovery

Database security

Denial of service

Denial of service attacks and countermeasures

Dependability and reliability

Design or analysis of security protocols

Distributed access control

Distributed and parallel systems security

Electronic commerce

Formal security analyses

Fraudulent usage

Information flow

Information hiding and watermarking

Intellectual property protection

Intrusion detection

Key management

Multicast security

Network and Internet security

Network forensics

Network security performance evaluation

Non-repudiation

Peer-to-peer security

Prevention of traffic analysis

Privacy protection

Public key cryptography and key management

Revocation of malicious parties

Risk assessment and management

Secure location determination

Secure PHY/MAC/routing protocols

Secure routing protocols

Security group communications

Security in ad hoc networks

Security in cellular networks (2G, 2.5G, 3G, B3G,

Security in communications

Security in content-delivery networks

Security in distributed systems

Security in domain name service

Security in e-mail

Security in high-speed networks

Security in integrated networks

Security in integrated wireless networks

Security in internet and WWW

Security in IP networks

Security in mobile IP

Security in optical systems and networks

Security in peer-to-peer networks

Security in satellite networks

Security in sensor networks

Security in VoIP

Security in wired and wireless integrated networks

Security in Wired Networks

Security in wireless communications

Security in wireless internet

Security in wireless LANs (IEEE 802.11 WLAN, WiFi,

Security in wireless MANs (IEEE 802.16 and WiMAX)

Security in wireless PANs (Bluetooth and IEEE 802.

Security policies

Security specification techniques

Security standards

Tradeoff analysis between performance and security

Trust establishment

Viruses worms and other malicious code

WLAN and Bluetooth security

Important Dates - IJS CFP - Volume 6, Issue 1.
Paper Submission: November 30, 2011
Author Notification: January 01, 2012
Issue Publication: February 2012

For complete details about IJS archives publications, abstracting/indexing, editorial board and other important information, please refer to IJS homepage.

We look forward to receive your valuable papers. If you have further questions please do not hesitate to contact us at cscpress@cscjournals.org. Our team is committed to provide a quick and supportive service throughout the publication process.
http://www.cscjournals.org/csc/journals/IJS/description.php?JCode=IJS

cfp categories: 
american
classical_studies
general_announcements
graduate_conferences
international_conferences
journals_and_collections_of_essays
professional_topics
theory