posted by user: Busra || 5312 views || tracked by 5 users: [display]

IJCIS 2024 : International Journal on Cryptography and Information Security

FacebookTwitterLinkedInGoogle

Link: https://wireilla.com/ijcis/index.html
 
When N/A
Where N/A
Submission Deadline Jul 28, 2024
Notification Due Aug 27, 2024
Final Version Due Sep 3, 2024
Categories    information security   cryptography   computer science   engineering
 

Call For Papers

International Journal on Cryptography and Information Security (IJCIS)

Call for Papers

International Journal on Cryptography and Information Security (IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

Topics of Interest :

  • Cryptographic protocols
  • Cryptography and Coding
  • Intractability
  • Privacy and authentication
  • Key management
  • Authentication
  • Trust Management
  • Quantum cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological & Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement & Unsupervised Learning
  • Autonomy-Oriented Computing
  • Co evolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust models and metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Wireless Network Security
  • Information Hiding
  • Data & System Integrity
  • E- Commerce
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and Quos Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems

Paper Submission:

Authors are invited to submit papers for this journal through E-mail : ijcisjournal@wireilla.com .Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates :

 

Submission Deadline:July 28, 2024
Authors Notification: August 27, 2024
Final Manuscript Due: September 3, 2024
Publication Date:Determined by the Editor-in-Chief

Related Journal :


Current Issue



June 2024, Volume 14, Number 2

Modeling Diffie Hellman Key Exchange Algorithm using Object-Oriented Analysis and Design Technique Full Text
Ashioba, Nwanze Chukwudi1, Emma-Osiebe Obaro2, Ogbodhu, Charles Uzoma-Odoji-Kpasa3, Ndubuife Nonso Daniel4 ,1Dennis Osadebay University AnwaiAsaba, Nigeria,2Delta State polytechnic Ogwashi-uku, Nigeria, 3Michael & Cecilia Ibru University, Nigeria, 4National Open University of Nigeria


December 2023, Volume 13, Number 4

Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Function with NTRU Linkable Ring Signature Full Text
Bong Gon Kim1, Dennis Wong2, and Yoon Seok Yang3, 1Stony Brook University, USA, 2Macao Polytechnic University, China, 3SUNY Korea University, South Korea

Light-HHB: A Lighter Version of HHB for Resource-Constrained IoT Devices Full Text
Ahmad Khoureich Ka, Alioune Diop University of Bambey, Senegal

September 2023, Volume 13, Number 2/3

Cyber-Security Tactics in Mitigating Cyber-Crimes: A Review and Proposal Full Text
Adeniyi Phillips, Ibraheem Ojelade, Esther Taiwo, Callistus Obunadike and Kunle Oloyede, Austin Peay State University, USA


March 2023, Volume 13, Number 1

The Evolving Landscape of Cybersecurity: Red Teams, Large Language Models, and the Emergence of New AI Attack Surfaces Full Text
Forrest McKee and David Noever, PeopleTec, USA


Combining Blockchain and IoT for Decentralized Healthcare Data Management Full Text
1Sajad Meisami,2 Sadaf Meisami,3Melina Yousefi,4 and Mohammad Reza Aref, 1Illinois Institute of Technology, USA, 2Kharazmi University, Iran, 3Isfahan University of Technology, Iran,4Sharif University of Technology, Iran


December 2022, Volume 12, Number 4

Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptibility Full Text
1Henri Bruno Razafindradina2 and Paul Auguste Randriamitantsoa2, 1Higher Institute of TechnologyDiego-Suarez, Madagascar,2Higher Polytechnic School, Antananarivo, Madagascar


September 2022, Volume 12, Number 2/3

A Graph-based and Declarative Approach to a Secure Resource Management in Smart Factories  Full Text
Alexander Lawall1 and Thomas Schaller2, 1IU International University of Applied Science, Germany, 2University of Applied Sciences Hof, Germany

Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals  Full Text
Janaki Raman Palaniappan, Software Engineer, USA

March 2022, Volume 12, Number 1

Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number System  Full Text
Daniel Asiedu1 and Abdul-MuminSalifu2, 1Tamale Technical University, Ghana, 2C. K. T. University of Technology and Applied Sciences, Ghana

December 2021, Volume 11, Number 4

Progress of Machine Learning in the Field of Intrusion Detection Systems  Full Text
Ouafae Elaeraj and Cherkaoui Leghris, Hassan II University of Casablanca, Morocco

September 2021, Volume 11, Number 2/3

Robustness Evaluation of Watermarking based on the Harris Principle  Full Text
Maliki Badolo and Telesphore Tiendrebeogo, Nazi Boni University, Burkina Faso

March 2021, Volume 11, Number 1

Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards  Full Text
Cheman Shaik, VISH Consulting Services Inc, USA

Editor in Chief :

Editorial Board Members

... More

Related Resources

CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
Ei/Scopus-AACIP 2024   2024 2nd Asia Conference on Algorithms, Computing and Image Processing (AACIP 2024)-EI Compendex
CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
IEEE-Ei/Scopus-ACEPE 2024   2024 IEEE Asia Conference on Advances in Electrical and Power Engineering (ACEPE 2024) -Ei Compendex
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
CSIA 2024   15th International Conference on Communications Security & Information Assurance
IEEE-Ei/Scopus-SGGEA 2024   2024 Asia Conference on Smart Grid, Green Energy and Applications (SGGEA 2024) -EI Compendex
ICICT 2025   IEEE--2025 The 8th International Conference on Information and Computer Technologies (ICICT 2025)
ICBDA 2025   IEEE--2025 the 10th International Conference on Big Data Analytics (ICBDA 2025)
AISC 2024   12th International Conference on Artificial Intelligence, Soft Computing