International Journal of Security and Networks

Call for papers
Editor in Chief: Prof. Yang Xiao
ISSN online: 1747-8413
ISSN print: 1747-8405
4 issues per year
Subscription price

 

IJSN proposes and fosters discussion on and dissemination of network security related issues.

 



 Topics covered include

  • Cellular networks, wireless LANs, PANs, MANs, sensor/ad hoc networks
  • Mobile IP, IP and satellite networks, wireless internet/communications
  • Wired/wireless integrated networks
  • Internet/WWW, high-speed/P2P networks, VoIP, e-mail
  • Optical systems/networks, integrated/content-delivery networks
  • Domain name service, communications, distributed systems
  • Attacks, security mechanisms/services, authentication/authorisation, access control
  • Multicast security, data confidentiality/integrity, on-repudiation
  • Firewalls, privacy protection, security specification, encryption/decryption
  • Formal analyses, group communications, intrusion detection, anonymity
  • Key management, trust establishment, malicious parties' revocation, security policies
  • Fraudulent usage, prevention of traffic analysis, denial of service
  • PHY/MAC/routing protocols, dependability/reliability, secure location determination
  • Performance evaluation, performance/security tradeoff analysis
  • Network forensics, design/analysis of security protocols, security standards

 

More topics...

Security in Wireless Networks and Mobile Computing

  • Security in cellular networks (2G, 2.5G, 3G, B3G, 4G, etc.)
  • Security in wireless LANs (IEEE 802.11 WLAN, WiFi, and HiperLAN/2)
  • Security in wireless PANs (Bluetooth and IEEE 802.15)
  • Security in wireless MANs (IEEE 802.16 and WiMAX)
  • Security in sensor networks
  • Security in ad hoc networks
  • Security in mobile IP
  • Security in wireless internet
  • Security in satellite networks
  • Security in integrated wireless networks
  • Security in wired and wireless integrated networks
  • Security in wireless communications

Security in Wired Networks

  • Security in IP networks
  • Security in internet and WWW
  • Security in high-speed networks
  • Security in peer-to-peer networks
  • Security in optical systems and networks
  • Security in VoIP
  • Security in e-mail
  • Security in domain name service
  • Security in integrated networks
  • Security in communications
  • Security in content-delivery networks
  • Security in distributed systems

Security Issues in Networks include:

  • Attacks, security mechanisms, and security services
  • Authentication
  • Authorisation
  • Access control
  • Multicast security
  • Distributed access control
  • Data confidentiality
  • Data integrity
  • Non-repudiation
  • Firewall
  • Privacy protection
  • Security specification techniques
  • Encryption and decryption
  • Secure routing protocols
  • Formal analyses
  • Security group communications
  • Intrusion detection
  • Key management
  • Trust establishment
  • Revocation of malicious parties
  • Security policies
  • Fraudulent usage
  • Dependability and reliability
  • Anonymity
  • Prevention of traffic analysis
  • Secure PHY/MAC/routing protocols
  • Secure location determination
  • Denial of service
  • Network security performance evaluation
  • Tradeoff analysis between performance and security
  • Network forensics
  • Design or analysis of security protocols
  • Security standards

 

Hide

More on this journal...
Objectives

The objectives of IJSN are to establish an effective channel of communication between industry, government agencies, academic and research institutions and persons concerned with network security related problems. It also aims to promote and coordinate developments in the field of wireless/wired network security.


Readership

IJSN provides a vehicle to help professionals, academics, researchers, developers, working in the field of wireless/wired network security to disseminate information and to learn from each other's work.


Contents

IJSN publishes original papers, short papers, and review papers. Special Issues devoted to important topics in wireless/wired network security will also be published.


 

Hide

Browse issues

Vol. 9
Vol. 8
Vol. 7
Vol. 6
Vol. 5
Vol. 4

 

More volumes...

 IJSN is indexed in:

 

 IJSN is listed in:

 

Editor in Chief

  • Xiao, Yang, University of Alabama, USA
    (yangxiao@cs.ua.edu)

    Editorial Board Members

    • Azadmanesh, Azad, University of Nebraska at Omaha, USA
    • Bertino, Elisa, Purdue University, USA
    • Burmester, Michael, Florida State University, USA
    • Chen, Thomas M., Swansea University, UK
    • Cheng, Xiuzhen (Susan), The George Washington University, USA
    • Dong, Yingfei, University of Hawaii, USA
    • Du, David Hung-Chang, University of Minnesota, USA
    • Du, Ding-zhu, University of Texas at Dallas, USA
    • Elnozahy, Elmootazbellah, IBM Austin Research Lab, USA
    • Evans, Joseph B., The University of Kansas, USA
    • Guan, Yong, Iowa State University, USA
    • Gu, Guofei, Texas A&M University, USA
    • Huang, Chin-Tser, University of South Carolina, USA
    • Jiang, Xuxian, North Carolina State University, USA
    • Johansson, Thomas, Lund University, Sweden
    • Kankanhalli, Mohan S., National University of Singapore, Singapore
    • Kesidis, George, The Pennsylvania State University, USA
    • Kuo, Sy-Yen, National Taiwan University, Taiwan
    • Liang, Zhenkai, National University of Singapore, Singapore
    • Li, Kai, Princeton University, USA
    • Lin, Jason Yi-Bing, National Chiao Tung University, Taiwan
    • Mateti, Prabhaker, Wright State University, USA
    • Maxion, Roy A., Computer Science Department, USA
    • Misic, Jelena, Ryerson University, Canada
    • Mu, Yi, University of Wollongong, Australia
    • Nyberg, Kaisa, Helsinki University of Technology, Finland
    • Pan, Yi, Georgia State University, USA
    • Petros, Nicopolitidis, Aristotle University of Thessaloniki, Greece
    • Pieprzyk, Josef, Macquarie University, Australia
    • Ray, Indrajit, Colorado State University, USA
    • Schiper, André, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
    • Shen, Xuemin, University of Waterloo, Canada
    • Sivalingam, Krishna M, Indian Institute of Technology Madras, India
    • Suri, Neeraj, Technische University Darmstadt, Germany
    • Tygar, Doug, University of California at Berkeley, USA
    • Vaidya, Jaideep S., Rutgers, The State University of New Jersey, USA
    • Wang, Xiaofeng, Indiana University at Bloomington, USA
    • Weng, Ning, Southern Illinois University at Carbondale, USA
    • Wu, Jie, Temple University, USA
    • Yao, Danfeng (Daphne), Virginia Tech, USA
    • Yuan, Xiaojing, University of Houston, USA
    • Yu, Haifeng, National University of Singapore, Singapore
    • Yung, Moti, Columbia University, USA
    • Zhao, Wei, University of Macau, Macao
    • Zou, Xukai, Indiana University Purdue University Indianapolis, USA

     

    A few essentials for publishing in this journal

     

    • Submitted articles should not have been previously published or be currently under consideration for publication elsewhere.
    • Conference papers may only be submitted if the paper has been completely re-written (taken to mean more than 50%) and the author has cleared any necessary permissions with the copyright owner if it has been previously copyrighted.
    • All our articles are refereed through a double-blind process.
    • All authors must declare they have read and agreed to the content of the submitted article. A full statement of our Ethical Guidelines for Authors (PDF) is available.

     

    Submission process

     

    All articles for this journal must be submitted using our online submissions system.

    Read our Submitting articles page.

     

     

    Journal news

    • Geographical passwords worth their salt

       

      Now you can protect yourself online with your secret place. Its much easier to remember a place you have visited than a long, complicated password, which is why computer scientist Ziyad Al-Salloum of ZSS-Research in Ras Al Khaimah, UAE, is developing a system he calls geographical passwords. Writing in a freely available open access research [...]

      More details...

    •  

      4 - 5 February 2015
      Nairobi, Kenya


    •  

      12 - 13 November 2014
      Cape Town, South Africa