Security and Networks - Inderscience Publishers

inderscience.com

Security and Networks - Inderscience Publishers

International Journal of

Security and

Networks

© 2013 Inderscience Enterprises Ltd


Scope of the Journal

IJSN proposes and fosters discussion on and dissemination of network security

related issues.

Subject coverage:

Topics suitable for IJSN include but are not

limited to:

Security in Wireless Networks and Mobile

Computing

Security in cellular networks (2G, 2.5G, 3G,

B3G, 4G, etc.)

Security in wireless LANs (IEEE 802.11

WLAN, WiFi, and HiperLAN/2)

Security in wireless PANs (Bluetooth and IEEE

802.15)

Security in wireless MANs (IEEE 802.16 and

WiMAX)

Security in sensor networks

Security in ad hoc networks

Security in mobile IP

Security in wireless internet

Security in satellite networks

Security in integrated wireless networks

Security in wired and wireless integrated

networks

Security in wireless communications

Security in Wired Networks

Security in IP networks

Security in internet and WWW

Security in high-speed networks

Security in peer-to-peer networks

Security in optical systems and networks

Security in VoIP

Security in e-mail

Security in domain name service

Security in integrated networks

Security in communications

Security in content-delivery networks

Security in distributed systems

Security Issues in Networks include:

• Attacks, security mechanisms, and security

services

• Authentication

• Authorisation

• Access control

• Multicast security

• Distributed access control

• Data confidentiality

• Data integrity

• Non-repudiation

• Firewall

• Privacy protection

Security specification techniques

• Encryption and decryption

• Secure routing protocols

• Formal analyses

Security group communications

• Intrusion detection

• Key management

• Trust establishment

• Revocation of malicious parties

Security policies

• Fraudulent usage

• Dependability and reliability

• Anonymity

• Prevention of traffic analysis

• Secure PHY/MAC/routing protocols

• Secure location determination

• Denial of service

• Network security performance evaluation

• Tradeoff analysis between performance and

security

• Network forensics

• Design or analysis of security protocols

Security standards

International Journal of

Security and

Networks

www.inderscience.com/ijsn

visit

www.inderscience.com


Members of the Editorial Board

Editor-in-Chief

Prof. Yang Xiao

University of Alabama, USA

Editorial Board

Dr. Azad Azadmanesh

University of Nebraska at Omaha,

USA

Prof. Dr. Elisa Bertino

Purdue University, USA

Prof. Dr. Michael Burmester

Florida State University, USA

Prof. Thomas M. Chen

Swansea University, UK

Dr. Xiuzhen (Susan) Cheng

The George Washington University,

USA

Prof. Yingfei Dong

University of Hawaii, USA

Prof. David Hung-Chang Du

University of Minnesota, USA

Dr. Ding-zhu Du

University of Texas at Dallas, USA

Dr. Elmootazbellah Elnozahy

IBM Austin Research Lab, USA

Dr. Joseph B. Evans

The University of Kansas, USA

Dr. Guofei Gu

Texas A&M University, USA

Prof. Yong Guan

Iowa State University, USA

Dr. Chin-Tser Huang

University of South Carolina, USA

Dr. Xuxian Jiang

North Carolina State University, USA

Dr. Thomas Johansson

Lund University, Sweden

Dr. George Kesidis

The Pennsylvania State University,

USA

Dr. Sy-Yen Kuo

National Taiwan University, Taiwan

Dr. Kai Li

Princeton University, USA

Dr. Zhenkai Liang

National University of Singapore,

Singapore

Prof. Jason Yi-Bing Lin

National Chiao Tung University,

Taiwan

Dr. Prabhaker Mateti

Wright State University, USA

Dr. Roy A. Maxion

Carnegie Mellon University, USA

Dr. Jelena Misic

Ryerson University, Canada

Dr. Yi Mu

University of Wollongong, Australia

Dr. Kaisa Nyberg

Helsinki University of Technology,

Finland

Prof. Yi Pan

Georgia State University, USA

Prof. Nicopolitidis Petros

Aristotle University of Thessalonik,

Greece

Prof. Dr. Josef Pieprzyk

Macquarie University, Australia

Dr. Indrajit Ray

Colorado State University, USA

Dr. André Schiper

École Polytechnique Fédérale de

Lausanne (EPFL), Switzerland

Dr. Xuemin Shen

University of Waterloo, Canada

Dr. Neeraj Suri

Technische University Darmstadt,

Germany

Prof. Dr. Doug Tygar

University of California at Berkeley,

USA

Dr. Jaideep S. Vaidya

Rutgers, The State University of

New Jersey, USA

Dr. Xiaofeng Wang

Indiana University at Bloomington,

USA

Dr. Ning Weng

Southern Illinois University at

Carbondale, USA

Prof. Jie Wu

Temple University, USA

Dr. Shouhuai Xu

University of Texas at San Antonio,

USA

Dr. Danfeng (Daphne) Yao

Virginia Tech, USA

Dr. Xiaojing Yuan

University of Houston,

USA

Dr. Haifeng Yu

National University of Singapore,

USA

Dr. Moti Yung

Columbia University,

USA

Dr. Wei Zhao

University of Macau, China

Dr. Xukai Zou

Indiana University Purdue University

Indianapolis, USA

Prof. Mohan S. Kankanhalli

National University of Singapore,

Singapore

visit

Dr. Krishna M Sivalingam

Indian Institute of Technology

Madras, India

www.inderscience.com


Methods of payment

Content of Inaugural

Issue of IJSN

VOL. 1(1/2), 2006

Workflow authorisation in mediator-free

environments

Mohamed Shehab, Elisa Bertino, Arif Ghafoor

Vulnerability analysis of certificate graphs

Eunjin (EJ) Jung, Mohamed G. Gouda

Secure scalable group signature with

dynamic joins and separable authorities

Aggelos Kiayias, Moti Yung

A survey of key evolving cryptosystems

Matt Franklin

A taxonomy of internet traceback

Ihab Hamadeh, George Kesidis

An approach to synthesise safe systems

Arshad Jhumka, Felix Freiling, Christof Fetzer,

Neeraj Suri

To be completed by all subscribers

Terms are payment with order. Payment by

cheque, banker’s draft or credit card is

acceptable.

Name of subscriber

............................................................................

...........................................................................

Position ..............................................................

Institution ............................................................

Address ..............................................................

...........................................................................

...........................................................................

...........................................................................

...........................................................................

...........................................................................

...........................................................................

Wireless networking security: open issues

in trust, management, interoperation and

measurement

Joseph B. Evans, Weichao Wang,

Benjamin J. Ewy

Three ways to mount distinguishing

attacks on irregularly clocked stream

ciphers

Hakan Englund, Thomas Johansson

Building trust in peer-to-peer systems: a

review

Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli

Secure collaborations over message

boards

Mahalingam Ramkumar, Nasir Memon


...........................................................................

Fax ......................................................................

E-mail .................................................................

Credit card type and number

............................................................................

............................................................................

Expiry date .........................................................

Three-digit security number

(on the reverse of the credit card) ......................

Signature.............................................................

Date ....................................................................

Please address subscription orders to the

address overleaf


Subscription order form

To find out the subscription rates for

International Journal of Security and

Networks (IJSN),

please go to

www.inderscience.com/ijsn or

http://www.inderscience.com/subscribe.php

(for all Inderscience titles, including IJSN)

This form may be photocopied or

downloaded from

www.inderscience.com/www/ielsubsform2.pdf

Journals may be ordered online from

http://inderscience.metapress.com

Please address subscription orders to:

Inderscience Publishers (Order Dept.)

World Trade Center Building II

29 Route de Pre-Bois,

Case Postale 856,

CH-1215 Genève 15,

SWITZERLAND

For rush orders please:

fax: +41-22-7910885 or

E-mail: subs@inderscience.com

Please enter the following regular

subscriptions to IJSN

........ subscriptions (Print or Online)

[delete as necessary]

........ subscriptions (Print and Online)


Relevant

Inderscience Titles

International Journal of Advanced Media and

Communication

International Journal of Applied Cryptography

International Journal of Communication Networks

and Distributed Systems

International Journal of Electronic Security and

Digital Forensics

International Journal of Information and Coding

Theory

International Journal of Information and

Communication Technology

International Journal of Information and

Computer Security

International Journal of Learning Technology

International Journal of Mobile Communications

International Journal of Mobile Learning and

Organisation

International Journal of Mobile Network Design

and Innovation

International Journal of Networking and Virtual

Organisations

International Journal of Radio Frequency

Identification Technology and Applications

International Journal of Sensor Networks

International Journal of Wireless and Mobile

Computing

Total cost ..........................................................

These titles are part of a unique profile on:

COMMUNICATIONS AND MOBILE

TECHNOLOGY

Methods of payment overleaf

For information about these titles and the

substantial portfolio of journals developed

by Inderscience, please visit the website

at: www.inderscience.com


Notes for Authors and Submission of Papers

Submitted papers should not have been previously published or be currently under

consideration for publication elsewhere.

All papers are refereed through a double-blind process. A guide for authors and other

relevant information for submitting papers are available on the Submission of Papers

section of the Inderscience website: please go to

Author Guidelines

(www.inderscience.com/guidelines)

To submit a paper, please go to

Submission of Papers

(http://www.inderscience.com/papers)

ALL PAPERS MUST BE SUBMITTED ONLINE. If you experience any problems

submitting your paper online, please contact submissions@inderscience.com, describing

the exact problem you experience.

(Please include in your email the title of the Journal)

© 2013 Inderscience Enterprises Ltd

ISSN: 1747-8405 (Print), ISSN: 1747-8413 (Online)

More magazines by this user
Similar magazines