![]() |
|
Aims & Scope
All manuscripts must be prepared in English and are subject to a rigorous and fair peer-review process. Generally, accepted papers will appear online within 3 weeks followed by printed hard copy. The journal publishes original papers including but not limited to the following fields:
· Access Control
· Anti-Virus and Anti-Worms
· Authentication and Authorization
· Biometric Security
· Cryptography
· Data and System Integrity
· Database Security
· Distributed Systems Security
· Electronic Commerce Security
· Fraud Control
· Grid Security
· Information Hiding and Watermarking
· Information Privacy
· Information Security Engineering
· Intellectual Property Protection
· Intrusion Detection
· Key Management and Key Recovery
· Language-based Security
· Network Security
· Operating System Security
· Risk Evaluation and Security Certification
· Security and Privacy for Social Computing
· Security Evaluation
· Security for Mobile Computing
· Security Models
· Security Protocols
· Signature and Key Agreement Protocol
· Software Security
· System Security
· Trusted Computing and Trustworthy Computing Technology
We are also interested in: 1) Short Reports—2-5 page papers where an author can present either preliminary data or an idea with theoretical background but has not yet completed the research needed for a complete paper; 2) Book Reviews—Comments and critiques.