International Journal of Security (IJS)

aligned to the right International Journal of Security (IJS) accepts scientific research and review articles from diverse fields in microelectronics, including but not limited to:

The realm of International Journal of Security (IJS) extends, but not limited, to the following:
  - Access control and audit
  - Anonymity
  - Anonymity and pseudonymity
  - Attacks, security mechanisms, and security service
  - Authentication
  - Authorisation
  - Biometrics
  - Cellular/wireless/mobile/satellite networks securi
  - Code security, including mobile code security
  - Computer forensics
  - Confidentiality, privacy, integrity, authenticatio
  - Cryptography and cryptanalysis
  - Data confidentiality issues
  - Data integrity issues
  - Data recovery
  - Database security
  - Denial of service
  - Denial of service attacks and countermeasures
  - Dependability and reliability
  - Design or analysis of security protocols
  - Distributed access control
  - Distributed and parallel systems security
  - Electronic commerce
  - Formal security analyses
  - Fraudulent usage
  - Information flow
  - Information hiding and watermarking
  - Intellectual property protection
  - Intrusion detection
  - Key management
  - Multicast security
  - Network and Internet security
  - Network forensics
  - Network security performance evaluation
  - Non-repudiation
  - Peer-to-peer security
  - Prevention of traffic analysis
  - Privacy protection
  - Public key cryptography and key management
  - Revocation of malicious parties
  - Risk assessment and management
  - Secure location determination
  - Secure PHY/MAC/routing protocols
  - Secure routing protocols
  - Security group communications
  - Security in ad hoc networks
  - Security in cellular networks (2G, 2.5G, 3G, B3G,
  - Security in communications
  - Security in content-delivery networks
  - Security in distributed systems
  - Security in domain name service
  - Security in e-mail
  - Security in high-speed networks
  - Security in integrated networks
  - Security in integrated wireless networks
  - Security in internet and WWW
  - Security in IP networks
  - Security in mobile IP
  - Security in optical systems and networks
  - Security in peer-to-peer networks
  - Security in satellite networks
  - Security in sensor networks
  - Security in VoIP
  - Security in wired and wireless integrated networks
  - Security in Wired Networks
  - Security in wireless communications
  - Security in wireless internet
  - Security in wireless LANs (IEEE 802.11 WLAN, WiFi,
  - Security in wireless MANs (IEEE 802.16 and WiMAX)
  - Security in wireless PANs (Bluetooth and IEEE 802.
  - Security policies
  - Security specification techniques
  - Security standards
  - Tradeoff analysis between performance and security
  - Trust establishment
  - Viruses worms and other malicious code
  - WLAN and Bluetooth security

These areas aim to target the foremost scientific peer reviewed journal encompassing diverse fields related to the cutting-edge technological advances in both academic and industrial arenas.