CFP - IJS

Computer Science Journals (CSC Journals) invites researchers, editors, scientists & scholars to publish their scientific research papers in an International Journal of Security (IJS) Volume 6, Issue 3.

Information Security is an important aspect of protecting the information society from a wide variety of threats. The International Journal of Security (IJS) presents publications and research that builds on computer security and cryptography and also reaches out to other branches of the information sciences. Our aim is to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.

IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. It is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. We welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.

CSC Journals anticipate and invite papers on any of the following topics:

Access control and audit Anonymity Anonymity and pseudonymity Attacks, security mechanisms, and security service Authentication Authorisation Biometrics Cellular/wireless/mobile/satellite networks securi Code security, including mobile code security Computer forensics Confidentiality, privacy, integrity, authenticatio Cryptography and cryptanalysis Data confidentiality issues Data integrity issues Data recovery Database security Denial of service Denial of service attacks and countermeasures Dependability and reliability Design or analysis of security protocols Distributed access control Distributed and parallel systems security Electronic commerce Formal security analyses Fraudulent usage Information flow Information hiding and watermarking Intellectual property protection Intrusion detection Key management Multicast security Network and Internet security Network forensics Network security performance evaluation Non-repudiation Peer-to-peer security Prevention of traffic analysis Privacy protection Public key cryptography and key management Revocation of malicious parties Risk assessment and management Secure location determination Secure PHY/MAC/routing protocols Secure routing protocols Security group communications Security in ad hoc networks Security in cellular networks (2G, 2.5G, 3G, B3G,	Security in communications	Security in content-delivery networks	Security in distributed systems	Security in domain name service	Security in e-mail	Security in high-speed networks	Security in integrated networks	Security in integrated wireless networks	Security in internet and WWW	Security in IP networks	Security in mobile IP	Security in optical systems and networks	Security in peer-to-peer networks	Security in satellite networks	Security in sensor networks	Security in VoIP	Security in wired and wireless integrated networks	Security in Wired Networks	Security in wireless communications	Security in wireless internet	Security in wireless LANs (IEEE 802.11 WLAN, WiFi, Security in wireless MANs (IEEE 802.16 and WiMAX) Security in wireless PANs (Bluetooth and IEEE 802.	Security policies	Security specification techniques	Security standards	Tradeoff analysis between performance and security	Trust establishment	Viruses worms and other malicious code	WLAN and Bluetooth security

Important Dates - IJS CFP - Volume 6, Issue 3. Paper Submission: March 31, 2012 Author Notification: May 15, 2012 Issue Publication: June 2012 For complete details about IJS archives publications, abstracting/indexing, editorial board and other important information, please refer to IJS homepage.

We look forward to receive your valuable papers. If you have further questions please do not hesitate to contact us at cscpress@cscjournals.org. Our team is committed to provide a quick and supportive service throughout the publication process. A complete list of journals can be found at http://www.cscjournals.org/csc/bysubject.php