posted by user: Busra || 6496 views || tracked by 8 users: [display]

IJCIS 2024 : International Journal on Cryptography and Information Security

FacebookTwitterLinkedInGoogle

Link: https://wireilla.com/ijcis/index.html
 
When N/A
Where N/A
Submission Deadline Nov 24, 2024
Notification Due Dec 24, 2024
Final Version Due Dec 31, 2024
Categories    information security   cryptography   computer science   engineering
 

Call For Papers

International Journal on Cryptography and Information Security (IJCIS)

Call for Papers

International Journal on Cryptography and Information Security (IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

Topics of Interest :

  • Cryptographic protocols
  • Cryptography and Coding
  • Intractability
  • Privacy and authentication
  • Key management
  • Authentication
  • Trust Management
  • Quantum cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological & Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement & Unsupervised Learning
  • Autonomy-Oriented Computing
  • Co evolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust models and metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Wireless Network Security
  • Information Hiding
  • Data & System Integrity
  • E- Commerce
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and Quos Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems

Paper Submission:

Authors are invited to submit papers for this journal through E-mail : ijcisjournal@wireilla.com .Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates :

 

Submission Deadline:November 24, 2024
Authors Notification: December 24, 2024
Final Manuscript Due: December 31, 2024
Publication Date:Determined by the Editor-in-Chief

Related Journal :


Current Issue



June 2024, Volume 14, Number 2

Modeling Diffie Hellman Key Exchange Algorithm using Object-Oriented Analysis and Design Technique Full Text
Ashioba, Nwanze Chukwudi1, Emma-Osiebe Obaro2, Ogbodhu, Charles Uzoma-Odoji-Kpasa3, Ndubuife Nonso Daniel4 ,1Dennis Osadebay University AnwaiAsaba, Nigeria,2Delta State polytechnic Ogwashi-uku, Nigeria, 3Michael & Cecilia Ibru University, Nigeria, 4National Open University of Nigeria


December 2023, Volume 13, Number 4

Quantum-Secure Hybrid Blockchain System for DID-Based Verifiable Random Function with NTRU Linkable Ring Signature Full Text
Bong Gon Kim1, Dennis Wong2, and Yoon Seok Yang3, 1Stony Brook University, USA, 2Macao Polytechnic University, China, 3SUNY Korea University, South Korea

Light-HHB: A Lighter Version of HHB for Resource-Constrained IoT Devices Full Text
Ahmad Khoureich Ka, Alioune Diop University of Bambey, Senegal

September 2023, Volume 13, Number 2/3

Cyber-Security Tactics in Mitigating Cyber-Crimes: A Review and Proposal Full Text
Adeniyi Phillips, Ibraheem Ojelade, Esther Taiwo, Callistus Obunadike and Kunle Oloyede, Austin Peay State University, USA


March 2023, Volume 13, Number 1

The Evolving Landscape of Cybersecurity: Red Teams, Large Language Models, and the Emergence of New AI Attack Surfaces Full Text
Forrest McKee and David Noever, PeopleTec, USA


Combining Blockchain and IoT for Decentralized Healthcare Data Management Full Text
1Sajad Meisami,2 Sadaf Meisami,3Melina Yousefi,4 and Mohammad Reza Aref, 1Illinois Institute of Technology, USA, 2Kharazmi University, Iran, 3Isfahan University of Technology, Iran,4Sharif University of Technology, Iran


December 2022, Volume 12, Number 4

Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptibility Full Text
1Henri Bruno Razafindradina2 and Paul Auguste Randriamitantsoa2, 1Higher Institute of TechnologyDiego-Suarez, Madagascar,2Higher Polytechnic School, Antananarivo, Madagascar


September 2022, Volume 12, Number 2/3

A Graph-based and Declarative Approach to a Secure Resource Management in Smart Factories  Full Text
Alexander Lawall1 and Thomas Schaller2, 1IU International University of Applied Science, Germany, 2University of Applied Sciences Hof, Germany

Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visuals  Full Text
Janaki Raman Palaniappan, Software Engineer, USA

March 2022, Volume 12, Number 1

Secured Paillier Homomorphic Encryption Scheme Based on the Residue Number System  Full Text
Daniel Asiedu1 and Abdul-MuminSalifu2, 1Tamale Technical University, Ghana, 2C. K. T. University of Technology and Applied Sciences, Ghana

December 2021, Volume 11, Number 4

Progress of Machine Learning in the Field of Intrusion Detection Systems  Full Text
Ouafae Elaeraj and Cherkaoui Leghris, Hassan II University of Casablanca, Morocco

September 2021, Volume 11, Number 2/3

Robustness Evaluation of Watermarking based on the Harris Principle  Full Text
Maliki Badolo and Telesphore Tiendrebeogo, Nazi Boni University, Burkina Faso

March 2021, Volume 11, Number 1

Safe, Clean and Unbiased Elections with Encrypted QR Code Voter Cards  Full Text
Cheman Shaik, VISH Consulting Services Inc, USA

Editor in Chief :

Editorial Board Members

... More

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ISCSO 2024   Multi-Objective Optimization Competition
ICICSP 2025   2025 8th International Conference on Information Communication and Signal Processing (ICICSP 2025)
LSIJ 2024   Life Sciences: an International Journal
BDE 2025   2025 7th International Conference on Big Data Engineering (BDE 2025)
ICIME--EI 2025   2025 13th International Conference on Information Management and Engineering (ICIME 2025)
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus