Singapore Journals: International Journal of Security (IJS)

International Journal of Security (IJS)

aligned to the right International Journal of Security (IJS) accepts scientific research and review articles from diverse fields in microelectronics, including but not limited to:

The realm of International Journal of Security (IJS) extends, but not limited, to the following:
  - Access control and audit
  - Anonymity
  - Anonymity and pseudonymity
  - Attacks, security mechanisms, and security service
  - Authentication
  - Authorisation
  - Biometrics
  - Cellular/wireless/mobile/satellite networks securi
  - Code security, including mobile code security
  - Computer forensics
  - Confidentiality, privacy, integrity, authenticatio
  - Cryptography and cryptanalysis
  - Data confidentiality issues
  - Data integrity issues
  - Data recovery
  - Database security
  - Denial of service
  - Denial of service attacks and countermeasures
  - Dependability and reliability
  - Design or analysis of security protocols
  - Distributed access control
  - Distributed and parallel systems security
  - Electronic commerce
  - Formal security analyses
  - Fraudulent usage
  - Information flow
  - Information hiding and watermarking
  - Intellectual property protection
  - Intrusion detection
  - Key management
  - Multicast security
  - Network and Internet security
  - Network forensics
  - Network security performance evaluation
  - Non-repudiation
  - Peer-to-peer security
  - Prevention of traffic analysis
  - Privacy protection
  - Public key cryptography and key management
  - Revocation of malicious parties
  - Risk assessment and management
  - Secure location determination
  - Secure PHY/MAC/routing protocols
  - Secure routing protocols
  - Security group communications
  - Security in ad hoc networks
  - Security in cellular networks (2G, 2.5G, 3G, B3G,
  - Security in communications
  - Security in content-delivery networks
  - Security in distributed systems
  - Security in domain name service
  - Security in e-mail
  - Security in high-speed networks
  - Security in integrated networks
  - Security in integrated wireless networks
  - Security in internet and WWW
  - Security in IP networks
  - Security in mobile IP
  - Security in optical systems and networks
  - Security in peer-to-peer networks
  - Security in satellite networks
  - Security in sensor networks
  - Security in VoIP
  - Security in wired and wireless integrated networks
  - Security in Wired Networks
  - Security in wireless communications
  - Security in wireless internet
  - Security in wireless LANs (IEEE 802.11 WLAN, WiFi,
  - Security in wireless MANs (IEEE 802.16 and WiMAX)
  - Security in wireless PANs (Bluetooth and IEEE 802.
  - Security policies
  - Security specification techniques
  - Security standards
  - Tradeoff analysis between performance and security
  - Trust establishment
  - Viruses worms and other malicious code
  - WLAN and Bluetooth security

These areas aim to target the foremost scientific peer reviewed journal encompassing diverse fields related to the cutting-edge technological advances in both academic and industrial arenas.