| |||||||||||||||
IJSPTM 2024 : International Journal of Security, Privacy and Trust Management | |||||||||||||||
Link: https://airccse.org/journal/ijsptm/index.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
International Journal of Security, Privacy and Trust Management ( IJSPTM ) Scope and TopicsWith the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks–both wired and wireless–centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals. Topics of interest include but are not limited to, the following
Paper SubmissionAuthors are invited to Submit papers for this journal through Email: ijsptm@aircconline.com or through Submission system Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. Important Dates
Related JournalCurrent IssueAugust 2024, Volume 13, Number 3 Optimizing Identity Management: Key Strategies for Effective Governance and Administration Full Text Guardians of the Digital Realm: Mapping Key Stakeholders in Data Privacy and Digital Credit Universe Full Text May 2024, Volume 13, Number 1/2 Analysis of Media Discourse on Intellectual Property Rights Related to Metaverse in Korea Full Text November 2023, Volume 12, Number 3/4 Deep Learning Meets Blockchain for Automated and Secure Access Control Full Text Object Capability Model for Tee: A Cheri Based Compartmentalization Approach Full Text May 2023, Volume 12, Number 2 The Performance Comparison of a Brute-Force Password Cracking Algorithm using Regular Functions and Generator Functions in Python Full Text February 2023, Volume 12, Number 1 How Reversibility Differentiates Cyber from Kinetic Warfare: A Case Study in the Energy Sector Full Text A Trust Management Framework for Vehicular Ad Hoc Networks Full Text August 2022, Volume 11, Number 3 Technical Analysis on the Cyber Organizational Criminology of Dictatorial Military Conducts -- Experience from Human Trafficking and Coercions by Military Cyber Aggressions Enhanced Fuzzing System for Proactive Security Gap Exposure GasMASk Annotation-based Code Generator as an Embedded Domain-Specific Language in Collaborative Multi-Agent Systems February 2021, Volume 10, Number 1 Security and Privacy Perceptions among Female Online Social Media Users: A Case Study of Bangladesh Editor in Chief
Editorial Board Members
... More |
|