Computer Science Journals (CSC Journals) invites researchers, editors, scientists & scholars to publish their scientific research papers in an International Journal of Security (IJS) Volume 6, Issue 2.
Information Security is an important aspect of protecting the information society from a wide variety of threats. The International Journal of Security (IJS) presents publications and research that builds on computer security and cryptography and also reaches out to other branches of the information sciences. Our aim is to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.
IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. It is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. We welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.
CSC Journals anticipate and invite papers on any of the following topics:
Access control and audit
Anonymity and pseudonymity
Attacks, security mechanisms, and security service
Security in wired and wireless integrated networks
Security in Wired Networks
Security in wireless communications
Security in wireless internet
Security in wireless LANs (IEEE 802.11 WLAN, WiFi,
Security in wireless MANs (IEEE 802.16 and WiMAX)
Security in wireless PANs (Bluetooth and IEEE 802.
Security specification techniques
Tradeoff analysis between performance and security
Viruses worms and other malicious code
WLAN and Bluetooth security
Important Dates - IJS CFP - Volume 6, Issue 2.
Paper Submission: January 31, 2012
Author Notification: March 15, 2012
Issue Publication: April 2012
For complete details about IJS archives publications, abstracting/indexing, editorial board and other important information, please refer to IJS homepage.
We look forward to receive your valuable papers. If you have further questions please do not hesitate to contact us at email@example.com. Our team is committed to provide a quick and supportive service throughout the publication process.
A complete list of journals can be found at http://www.cscjournals.org/csc/bysubject.php
Computer Science Journals (CSC Journals)
B-5-8 Plaza Mont Kiara, Mont Kiara
50480, Kuala Lumpur, Malaysia
Send comments and questions to H-Net
Webstaff. H-Net reproduces announcements that have been submitted to us as a
free service to the academic community. If you are interested in an announcement
listed here, please contact the organizers or patrons directly. Though we strive
to provide accurate information, H-Net cannot accept responsibility for the text of
announcements appearing in this service. (Administration)