International Journal of Security (IJS) accepts scientific research and review articles from diverse fields in microelectronics, including but not limited to:
The realm of International Journal of Security (IJS) extends, but not limited, to the following:
- Access control and audit
- Anonymity
- Anonymity and pseudonymity
- Attacks, security mechanisms, and security service
- Authentication
- Authorisation
- Biometrics
- Cellular/wireless/mobile/satellite networks securi
- Code security, including mobile code security
- Computer forensics
- Confidentiality, privacy, integrity, authenticatio
- Cryptography and cryptanalysis
- Data confidentiality issues
- Data integrity issues
- Data recovery
- Database security
- Denial of service
- Denial of service attacks and countermeasures
- Dependability and reliability
- Design or analysis of security protocols
- Distributed access control
- Distributed and parallel systems security
- Electronic commerce
- Formal security analyses
- Fraudulent usage
- Information flow
- Information hiding and watermarking
- Intellectual property protection
- Intrusion detection
- Key management
- Multicast security
- Network and Internet security
- Network forensics
- Network security performance evaluation
- Non-repudiation
- Peer-to-peer security
- Prevention of traffic analysis
- Privacy protection
- Public key cryptography and key management
- Revocation of malicious parties
- Risk assessment and management
- Secure location determination
- Secure PHY/MAC/routing protocols
- Secure routing protocols
- Security group communications
- Security in ad hoc networks
- Security in cellular networks (2G, 2.5G, 3G, B3G,
- Security in communications
- Security in content-delivery networks
- Security in distributed systems
- Security in domain name service
- Security in e-mail
- Security in high-speed networks
- Security in integrated networks
- Security in integrated wireless networks
- Security in internet and WWW
- Security in IP networks
- Security in mobile IP
- Security in optical systems and networks
- Security in peer-to-peer networks
- Security in satellite networks
- Security in sensor networks
- Security in VoIP
- Security in wired and wireless integrated networks
- Security in Wired Networks
- Security in wireless communications
- Security in wireless internet
- Security in wireless LANs (IEEE 802.11 WLAN, WiFi,
- Security in wireless MANs (IEEE 802.16 and WiMAX)
- Security in wireless PANs (Bluetooth and IEEE 802.
- Security policies
- Security specification techniques
- Security standards
- Tradeoff analysis between performance and security
- Trust establishment
- Viruses worms and other malicious code
- WLAN and Bluetooth security
These areas aim to target the foremost scientific peer reviewed journal encompassing diverse fields related to the cutting-edge technological advances in both academic and industrial arenas.