ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

IJS 2012 - CFP - International Journal of Security (IJS)

Date2012-02-15

Deadline2011-11-30

VenueKuala Lump, Malaysia Malaysia

Keywords

Websitehttp://www.cscjournals.org/csc/journals/...

Topics/Call fo Papers

Computer Science Journals (CSC Journals) invites researchers, editors, scientists & scholars to publish their scientific research papers in an International Journal of Security (IJS) Volume 6, Issue 1.

Information Security is an important aspect of protecting the information society from a wide variety of threats. The International Journal of Security (IJS) presents publications and research that builds on computer security and cryptography and also reaches out to other branches of the information sciences. Our aim is to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.

IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. It is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. We welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.

CSC Journals anticipate and invite papers on any of the following topics:

Access control and audit


Anonymity


Anonymity and pseudonymity


Attacks, security mechanisms, and security service


Authentication


Authorisation


Biometrics


Cellular/wireless/mobile/satellite networks securi


Code security, including mobile code security


Computer forensics


Confidentiality, privacy, integrity, authenticatio


Cryptography and cryptanalysis


Data confidentiality issues


Data integrity issues


Data recovery


Database security


Denial of service


Denial of service attacks and countermeasures


Dependability and reliability


Design or analysis of security protocols


Distributed access control


Distributed and parallel systems security


Electronic commerce


Formal security analyses


Fraudulent usage


Information flow


Information hiding and watermarking


Intellectual property protection


Intrusion detection


Key management


Multicast security


Network and Internet security


Network forensics


Network security performance evaluation


Non-repudiation


Peer-to-peer security


Prevention of traffic analysis


Privacy protection


Public key cryptography and key management


Revocation of malicious parties


Risk assessment and management


Secure location determination


Secure PHY/MAC/routing protocols


Secure routing protocols


Security group communications


Security in ad hoc networks


Security in cellular networks (2G, 2.5G, 3G, B3G,


Security in communications


Security in content-delivery networks


Security in distributed systems


Security in domain name service


Security in e-mail


Security in high-speed networks


Security in integrated networks


Security in integrated wireless networks


Security in internet and WWW


Security in IP networks


Security in mobile IP


Security in optical systems and networks


Security in peer-to-peer networks


Security in satellite networks


Security in sensor networks


Security in VoIP


Security in wired and wireless integrated networks


Security in Wired Networks


Security in wireless communications


Security in wireless internet


Security in wireless LANs (IEEE 802.11 WLAN, WiFi,


Security in wireless MANs (IEEE 802.16 and WiMAX)


Security in wireless PANs (Bluetooth and IEEE 802.


Security policies


Security specification techniques


Security standards


Tradeoff analysis between performance and security


Trust establishment


Viruses worms and other malicious code


WLAN and Bluetooth security

Important Dates - IJS CFP - Volume 6, Issue 1.
Paper Submission: November 30, 2011
Author Notification: January 01, 2012
Issue Publication: February 2012

For complete details about IJS archives publications, abstracting/indexing, editorial board and other important information, please refer to IJS homepage.

We look forward to receive your valuable papers. If you have further questions please do not hesitate to contact us at cscpress-AT-cscjournals.org. Our team is committed to provide a quick and supportive service throughout the publication process.

Last modified: 2011-10-25 21:34:56