CINXE.COM
International Journal on Cryptography and Information Security (IJCIS)
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="content-type" content="text/html; charset=utf-8"/> <meta name="description" content="International Journal on Cryptography and Information Security (IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security."/> <meta name="robots" content="index,nofollow"/> <meta name="keywords" content="Cryptographic protocols, Cryptography and Coding, Untraceability, Privacy and authentication"/> <meta name="audience" content="all"/> <style type="text/css"> .imagess { height:90px; text-align:left; margin:0px 5px 2px 8px; float:right; border:none; } a:visited { color:#60F; } #new_edit a { text-decoration:none; } #new_edit { font-size:13px; text-align:center; } ul.right_ul { margin-left:0px;padding-left:15px; } .rdd { text-align: center; background: #f2f2f2; color: #000; font-weight: 700; width: 130px; height: 100px; border-radius: 100%; box-shadow: inset 1px 0px 22px 3px #4080ca; font-family: 'Oswald', sans-serif; border: 5px solid #1f8ea3; margin: 5% auto; line-height: 110px; } </style> <title>International Journal on Cryptography and Information Security (IJCIS)</title> <link rel="stylesheet" type="text/css" href="style.css" /> </head> <body> <div id="wap"> <div id="page"> <div id="top"> <table width="100%" cellspacing="0" cellpadding="0" > <tr ><td align="right" class="search_input" colspan="3" height="26"> </td> </tr> <tr><td colspan="3" valign="top"><img src="ijcis.gif" alt=" International Journal on Cryptography and Information Security (IJCIS)" /></td></tr> </table> </div> <div id="menu"> <a href="index.html">Home</a> <a href="editorial.html">Editorial</a> <a href="current2024.html">Current Issue</a> <a href="submission.html">Submission</a> <a href="indexing.html">Indexing</a> <a href="specialissue.html"> Special Issue </a> <a href="contactus.html">Contacts</a> <a href="http://www.airccse.org/">AIRCC</a> </div> <div id="content"> <div id="left"> <h2 >Scope & Topics</h2> <p align="justify" style="margin:0 auto;">International Journal on Cryptography and Information Security ( IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security. </p> <h4>Topics of interest include, but are not limited to the following:</h4> <table align="center" width="100%" valign="top"><tr><td> <ul style=" font-size:13px; line-height:20px;"> <li>Cryptographic protocols</li> <li>Cryptography and Coding </li> <li>Untraceability</li> <li>Privacy and authentication</li> <li>Key management </li> <li>Authentication</li> <li>Trust Management</li> <li>Quantum cryptography</li> <li>Computational Intelligence in Security </li> <li>Artificial Immune Systems </li> <li>Biological & Evolutionary Computation </li> <li>Intelligent Agents and Systems </li> <li>Reinforcement & Unsupervised Learning </li> <li>Autonomy-Oriented Computing </li> <li>Coevolutionary Algorithms </li> <li>Fuzzy Systems </li> <li>Biometric Security </li> <li>Trust models and metrics </li> <li>Regulation and Trust Mechanisms </li> <li>Data Integrity </li> <li>Models for Authentication, Trust and Authorization </li> <li>Wireless Network Security</li> <li>Information Hiding</li> <li>Data & System Integrity</li></ul></td> <td valign="top"> <ul style=" font-size:13px; line-height:20px;"> <li>E- Commerce</li> <li>Access Control and Intrusion Detection </li> <li>Intrusion Detection and Vulnerability Assessment </li> <li>Authentication and Non-repudiation </li> <li>Identification and Authentication </li> <li>Insider Threats and Countermeasures </li> <li>Intrusion Detection & Prevention </li> <li>Secure Cloud Computing </li> <li>Security Information Systems Architecture and Design and Security Patterns </li> <li>Security Management </li> <li>Security Requirements (threats, vulnerabilities, risk, formal methods, etc.) </li> <li>Sensor and Mobile Ad Hoc Network Security </li> <li>Service and Systems Design and QoS Network Security </li> <li>Software Security </li> <li>Security and Privacy in Mobile Systems </li> <li>Security and Privacy in Pervasive/Ubiquitous Computing </li> <li>Security and Privacy in Web Sevices </li> <li>Security and Privacy Policies </li> <li>Security Area Control </li> <li>Security Deployment </li> <li>Security Engineering </li> <li>Security for Grid Computing </li> <li>Security in Distributed Systems</li></ul></td></tr></table> <h4 align="left">Important Dates</h4> <table align="center" style="margin-left:50px; font-size:14px;"> <tr><td width="124">Submission Deadline</td><td width="295">: <b> November 30, 2024</b></td></tr> <tr><td>Notification</td><td>: December 21, 2024</td></tr> <tr><td>Final Manuscript Due</td><td>: December 28, 2024</td></tr> <tr><td>Publication Date</td><td>: Determined by the Editor-in-Chief</td></tr></table> <p align="center"><a href="http://airccse.org/journal/ijcis/ijcis.txt">Call for Papers</a></p><br /><br /> <!--<h2 align="center">H-Index</h2> <div class="rdd" ><span style="font-size:44px;">14</span></div>--> <h2 align="center">H-Index</h2><br> <br> <img src="../h_logos/ijcis.png" alt="Smiley face" style="float:center; margin-left:280px; margin-top:-10px; margin-right:35px; height:100px; width:150px; align:center"> <br><br> <!--<b><font color="navy">IJCIS welcomes conferences to publish their proceedings / post conference proceedings</font></b><br /><br /> Special issue will be published for <a href="http://www.iccsi.net/" target="blank">ICCSI 2016</a> Conference proceedings <br />--> </div> <div id="right"> <div class="menu_right"> <ul> <li id="id"><a href="index.html">Scope & Topics</a> </li> <li><a href="http://airccse.org/ethics.html" target="_blank">Ethics</a></li> <li><a href="archives.html">Archives</a> </li> <li><a href="aited-articles.html">Most Cited Articles</a></li> <li><a href="ijcisleaflet.pdf" title="">Download leaflet <sup><font color="red" size="2"><b>New</b></font></sup></a></li> <li><a href="http://airccse.org/faq.html" target="_blank">FAQ</a></li> </ul> <br> <img src="ijcis-logo.png" alt="ijcis 10th year logo" style="float:center; margin-left:25px; margin-top:-10px; margin-bottom:20px"> <table width="100%"> <tbody><tr> <td><b>From</b><br> 2011</td> <td><b>Volumes</b><br> 14</td> </tr> <tr> <td><b>Issues</b><br> 33</td> <td><b>Articles</b><br> 91</td> </tr> </tbody></table> </div> <h2 align="center">Conferences</h2> <ul class="right_ul"> <li><a href="https://comit2024.org/crbl/index" target="_blank">CRBL 2024 - India</a></li> <li><a href="https://cse2024.org/scom/index" target="_blank">SCOM 2024 - UAE</a></li> <li><a href="https://itcse2024.org/crypis/index" target="_blank">CRYPIS 2024 - Canada</a></li> <li><a href="https://csity2024.org/asoft/index" target="_blank">ASOFT 2024 - Australia</a></li> <li><a href="https://cst2024.org/itcs/index" target="_blank">ITCS 2024- Austria</a></li> <li><a href="https://iccsea2024.org/csia/index" target="_blank">CSIA 2024 - Switzerland</a></li> </ul> <h2 align="center">Courtesy</h2> <p align="center"><img src="http://airccse.org/journal/images/pla.JPG" width="106" height="56" /></p> <h2 align="center">Related Journals</h2> <ul class="right_ul"> <li><a href="http://airccse.org/journal/ijnsa.html" target="blank">I.J.of Network Security & Its Applications</a></li> <li><a href="http://www.airccse.org/journal/ijsea/ijsea.html" target="blank">I.J.of Software Engineering & Applications</a></li> <li><a href="http://airccse.org/journal/ijsptm/index.html" target="blank">I.J.of Security, Privacy & Trust Management</a></li> <li><a href="http://airccse.org/journal/ijci/index.html" target="blank">I.J.of Cybernetics & Informatics</a></li><br></br><br></br> </ul><p></p> <p></p> </div> </div> <div class="clear"></div> <div id="footer"><table width="100%" > <tr><td height="20" colspan="2" align="right"><font color="white" size="2">Visit us on </font><br /><a href="https://youtu.be/19z3fzdWfQQ" target="blank"><img src="http://www.airccse.org/journal/ijngn/you.jpg" alt="" width="21" height="24" /></a><a href="https://www.facebook.com/ijcis.journal.1" target="blank"><img src="http://airccse.org/journal/facebook.png" alt="" width="21" height="24" /></a><a href="https://twitter.com/ijcisjournal1" target="blank"><img src="http://airccse.org/journal/twitter.png" alt="" width="21" height="24" /></a><a href="https://ijcisjournal.wordpress.com/" target="blank"><img src="http://airccse.org/journal/word.jpg" alt="" width="21" height="24" /></a></td></tr> <tr><td height="20" colspan="2" valign="top" align="center"><font color="white" size="2">Published by WSP, Sydney, Australia</font></td></tr></table> </div> </div> </div> </div> </body> </html>