posted by user: aircc_cfp || 13474 views || tracked by 33 users: [display]

IJCIS 2014 : International Journal on Cryptography and Information Security

FacebookTwitterLinkedInGoogle

Link: http://airccse.org/journal/ijcis/index.html
 
When N/A
Where N/A
Submission Deadline Sep 26, 2014
Notification Due Oct 26, 2014
Final Version Due Oct 30, 2014
 

Call For Papers

International Journal on Cryptography and Information Security ( IJCIS)


Scope & Topics:


International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.


Topics Of Interest Include but are not limited to:


  • Cryptographic protocols
  • Cryptography and Coding
  • Untraceability
  • Privacy and authentication
  • Key management
  • Authentication
  • Trust Management
  • Quantum cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological & Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement & Unsupervised Learning
  • Autonomy-Oriented Computing
  • Coevolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust models and metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Pervasive computing and ambient intelligence
  • Programming Languages
  • Wireless Network Security
  • Data & System Integrity

  • E- Commerce
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Sevices
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed System
  • Information Hiding

Important Dates :






Submission Deadline:September 26, 2014
Authors Notification:October 26, 2014
Final Manuscript Due:October 30, 2014
Publication Date:Determined by Editorial Board

Related Journals :


Related Resources

CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
IJCIS 2024   International Journal on Cryptography and Information Security
ICICT 2025   IEEE--2025 The 8th International Conference on Information and Computer Technologies (ICICT 2025)
ICBDA 2025   IEEE--2025 the 10th International Conference on Big Data Analytics (ICBDA 2025)
ICAIBD 2025   IEEE--2025 The 8th International Conference on Artificial Intelligence and Big Data (ICAIBD 2025)
ICGDA--EI 2025   2025 8th International Conference on Geoinformatics and Data Analysis (ICGDA 2025)
ICMIP 2025   2025 10th International Conference on Multimedia and Image Processing (ICMIP 2025)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust