International Journal on Cryptography and Information Security (IJCIS)
Call for Papers
International Journal on Cryptography and Information Security (IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.
Topics of Interest :
- Cryptographic protocols
- Cryptography and Coding
- Intractability
- Privacy and authentication
- Key management
- Authentication
- Trust Management
- Quantum cryptography
- Computational Intelligence in Security
- Artificial Immune Systems
- Biological & Evolutionary Computation
- Intelligent Agents and Systems
- Reinforcement & Unsupervised Learning
- Autonomy-Oriented Computing
- Co evolutionary Algorithms
- Fuzzy Systems
- Biometric Security
- Trust models and metrics
- Regulation and Trust Mechanisms
- Data Integrity
- Models for Authentication, Trust and Authorization
- Wireless Network Security
- Information Hiding
- Data & System Integrity
- E- Commerce
- Access Control and Intrusion Detection
- Intrusion Detection and Vulnerability Assessment
- Authentication and Non-repudiation
- Identification and Authentication
- Insider Threats and Countermeasures
- Intrusion Detection & Prevention
- Secure Cloud Computing
- Security Information Systems Architecture and Design and Security Patterns
- Security Management
- Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
- Sensor and Mobile Ad Hoc Network Security
- Service and Systems Design and Quos Network Security
- Software Security
- Security and Privacy in Mobile Systems
- Security and Privacy in Pervasive/Ubiquitous Computing
- Security and Privacy in Web Services
- Security and Privacy Policies
- Security Area Control
- Security Deployment
- Security Engineering
- Security for Grid Computing
- Security in Distributed Systems
Paper Submission:
Authors are invited to submit papers for this journal through E-mail : ijcisjournal@wireilla.com .Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates :
Submission Deadline | : | November 24, 2024 |
Authors Notification | : | December 24, 2024 |
Final Manuscript Due | : | December 31, 2024 |
Publication Date | : | Determined by the Editor-in-Chief |
Related Journal :
June 2024, Volume 14, Number 2
Modeling Diffie Hellman Key Exchange Algorithm using Object-Oriented Analysis and Design Technique Full Text
Ashioba, Nwanze Chukwudi1, Emma-Osiebe Obaro2, Ogbodhu, Charles Uzoma-Odoji-Kpasa3, Ndubuife Nonso Daniel4 ,1Dennis Osadebay University AnwaiAsaba, Nigeria,2Delta State polytechnic Ogwashi-uku, Nigeria, 3Michael & Cecilia Ibru University, Nigeria, 4National Open University of Nigeria
December 2023, Volume 13, Number 4
Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Function with NTRU Linkable Ring Signature Full Text
Bong Gon Kim1, Dennis Wong2, and Yoon Seok Yang3, 1Stony Brook University, USA, 2Macao Polytechnic University, China, 3SUNY Korea University, South Korea
Light-HHB: A Lighter Version of HHB for Resource-Constrained IoT Devices Full Text
Ahmad Khoureich Ka, Alioune Diop University of Bambey, Senegal
September 2023, Volume 13, Number 2/3
Cyber-Security Tactics in Mitigating Cyber-Crimes: A Review and Proposal Full Text
Adeniyi Phillips, Ibraheem Ojelade, Esther Taiwo, Callistus Obunadike and Kunle Oloyede, Austin Peay State University, USA
March 2023, Volume 13, Number 1
The Evolving Landscape of Cybersecurity: Red Teams, Large Language Models, and the Emergence of New AI Attack Surfaces Full Text
Forrest McKee and David Noever, PeopleTec, USA
Combining Blockchain and IoT for Decentralized Healthcare Data Management Full Text
1Sajad Meisami,2 Sadaf Meisami,3Melina Yousefi,4 and Mohammad Reza Aref, 1Illinois Institute of Technology, USA, 2Kharazmi University, Iran, 3Isfahan University of Technology, Iran,4Sharif University of Technology, Iran
December 2022, Volume 12, Number 4
Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptibility Full Text
1Henri Bruno Razafindradina2 and Paul Auguste Randriamitantsoa2, 1Higher Institute of TechnologyDiego-Suarez, Madagascar,2Higher Polytechnic School, Antananarivo, Madagascar
September 2022, Volume 12, Number 2/3
A Graph-based and Declarative Approach to a Secure Resource Management in Smart Factories Full Text
Alexander Lawall1 and Thomas Schaller2, 1IU International University of Applied Science, Germany, 2University of Applied Sciences Hof, Germany Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals Full Text
Janaki Raman Palaniappan, Software Engineer, USA March 2022, Volume 12, Number 1
Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number System Full Text
Daniel Asiedu1 and Abdul-MuminSalifu2, 1Tamale Technical University, Ghana, 2C. K. T. University of Technology and Applied Sciences, Ghana December 2021, Volume 11, Number 4
Progress of Machine Learning in the Field of Intrusion Detection Systems Full Text
Ouafae Elaeraj and Cherkaoui Leghris, Hassan II University of Casablanca, Morocco
September 2021, Volume 11, Number 2/3
Robustness Evaluation of Watermarking based on the Harris Principle Full Text
Maliki Badolo and Telesphore Tiendrebeogo, Nazi Boni University, Burkina FasoMarch 2021, Volume 11, Number 1
Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards Full Text
Cheman Shaik, VISH Consulting Services Inc, USA
Editor in Chief :
Editorial Board Members
- Aarti M. Karande, Mumbai University, India
- Abdelhamid Ahmed, Qatar University, Qatar
- Alshahrani Ali M S, University of Essex, United kingdom
- Amit Kumar Singh Sanger, Hindustan College of Science and Technology, India
- Anand Sharma, Museum Institute for Teaching Science, India
- Ankur Dumka, University of Petroleum and Energy Studies (UPES), India
- Ashutosh Kumar Dubey, Trinity Institute of Technology and Research, India
- Assem Mousa, EgyptAir, Egypt
- B. B. Gupta, University of New Brunswick, India