posted by user: cscjournals || 3032 views || tracked by 8 users: [display]

(IJS) 2009 : International Journal of Security (IJS)

FacebookTwitterLinkedInGoogle

Link: http://cscjournals.org/description.php?Jcode=IJS
 
When Jul 31, 2009 - Sep 30, 2009
Where Malaysia
Submission Deadline Jul 31, 2009
Notification Due Aug 30, 2009
Final Version Due Sep 30, 2009
Categories    security
 

Call For Papers

International Journal of Security (IJS)
ISSN (Online): 1985-2320

The mission of the Computer Science Journals (CSC Journals) http://www.cscjournals.org is to serve society through excellence in education, research, service and to generate new knowledge and technology for the benefit of everyone ranging from the academic and professional research communities to industry practitioners in a range of topics in computer sciences and engineering in general and computer security, biometrics and bioinformatics, image processing and signal processing. All journals under CSC seeks to publish a balanced mix of high quality theoretical or empirical research articles, case studies, book reviews, tutorials, editorials as well as pedagogical and curricular issues surrounding computer science and engineering fields.

Information Security is an important aspect of protecting the information society from a wide variety of threats. The International Journal of Security (IJS) presents publications and research that builds on computer security and cryptography and also reaches out to other branches of the information sciences. Our aim is to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.

IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. It is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. We welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.

The realm of International Journal of Security extends, but not limited, to the following:

• Access control and audit
• Anonymity
• Anonymity and pseudonym
• Attacks, security mechanisms, and security service
• Authentication
• Authorization
• Biometrics
• Cellular/wireless/mobile/satellite networks secure
• Code security, including mobile code security
• Computer forensics
• Confidentiality, privacy, integrity, authentication
• Cryptography and cryptanalysis
• Data confidentiality issues
• Data integrity issues
• Data recovery
• Database security
• Denial of service
• Denial of service attacks and countermeasures
• Dependability and reliability
• Design or analysis of security protocols
• Distributed access control
• Distributed and parallel systems security
• Electronic commerce
• Formal security analyses
• Fraudulent usage
• Information flow
• Information hiding and watermarking
• Intellectual property protection
• Intrusion detection
• Key management
• Multicast security
• Network and Internet security
• Network forensics
• Network security performance evaluation
• Non-repudiation
• Peer-to-peer security
• Prevention of traffic analysis
• Privacy protection
• Public key cryptography and key management
• Revocation of malicious parties
• Risk assessment and management
• Secure location determination
• Secure PHY/MAC/routing protocols
• Secure routing protocols
• Security group communications
• Security in ad hoc networks
• Security in cellular networks (2G, 2.5G, 3G, B3G,
• Security in communications
• Security in content-delivery networks
• Security in distributed systems
• Security in domain name service
• Security in e-mail
• Security in high-speed networks
• Security in integrated networks
• Security in integrated wireless networks
• Security in internet and WWW
• Security in IP networks
• Security in mobile IP
• Security in optical systems and networks
• Security in peer-to-peer networks
• Security in satellite networks
• Security in sensor networks
• Security in Void
• Security in wired and wireless integrated networks
• Security in Wired Networks
• Security in wireless communications
• Security in wireless internet
• Security in wireless LANs (IEEE 802.11 WLAN, Wife,
• Security in wireless Manes (IEEE 802.16 and Imax)
• Security in wireless Pans (Bluetooth and IEEE 802.
• Security policies
• Security specification techniques
• Security standards
• Tradeoff analysis between performance and security
• Trust establishment
• Viruses worms and other malicious code
• WLAN and Bluetooth security
• All other fields related to Security

International Journal of Security (IJS)
ISSN (Online): 1985-2320
Volume: 3 Issue: 4
Paper Submission: July 31, 2009
Author Notification: August 30, 2009
Journal Publication: September 2009

Related Resources

SP 2020   IEEE Symposium on Security and Privacy
IEEE COINS 2020   Internet of Things IoT | Artificial Intelligence | Machine Learning | Big Data | Blockchain | Edge & Cloud Computing | Security | Embedded Systems | Circuit and Systems | WSN | 5G
ASIACCS 2020   ACM ASIACCS 2020 : The 15th ACM ASIA Conference on Computer and Communications Security
Cyber Security 2020   IEEE International Conference on Cyber Security and Protection of Digital Services
SPTM 2020   8th International Conference of Security, Privacy and Trust Management
IoTBDS 2020   5th International Conference on Internet of Things, Big Data and Security
CSW 2021   2021 International Workshop on Cyber Security (CSW 2021)
FGCS-ETDNS 2020   Future Generation Computer Systems SI on Emerging Topics in Defending Networked Systems
ICSS 2019   5th International Conference on Software Security
CPCS 2020   Call for Chapters: Security and Privacy in Cyber-Physical Systems: Threats and Defenses