Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
International Journal of
Security andNetworksEditor-in-Chief: Prof. Yang Xiao
Visit www.inderscience.com/ijsnfor more information and sample articles
© 2017 Inderscience Enterprises Ltd
IJSN A5 leaflet_9x_Layout 1 27/02/2017 15:08 Page 1
Visit www.inderscience.com for details of over 420 titles
Scope of the Journal
ISSN: 1747-8405 (Print), ISSN: 1747-8413 (Online)
IJSN proposes and fosters discussion on and dissemination ofnetwork security related issues.
Contents:IJSN publishes original papers, short papers, and review
papers. Special Issues devoted to important topics in
wireless/wired network security will also be published.
Not sure if this title is the one for you? Visit the journal homepage at www.inderscience.com/ijsn where you can:
• View sample articles in full text HTML or PDF format
• Sign up for our free table of contents new issue alerts via e-mail or RSS
• View editorial board details
• Find out about how to submit your papers
• Find out about subscription options, in print, online or as part of a journals collection
You can order online at www.inderscienceonline.com or download an order form
from www.inderscience.com/subform.
This title is part of the Science, Engineering and Technology Collection
(see www.inderscience.com/set ). For library collection subscriptions or for a free institutional
online trial, please contact [email protected].
Topics covered include:• Cellular networks, wireless LANs, PANs,
MANs, sensor/ad hoc networks
• Mobile IP, IP and satellite networks, wireless
internet/communications
• Wired/wireless integrated networks
• Internet/WWW, high-speed/P2P networks,
VoIP, e-mail
• Optical systems/networks,
integrated/content-delivery networks
• Domain name service, communications,
distributed systems
• Attacks, security mechanisms/services,
authentication/authorisation, access control
• Multicast security, data
confidentiality/integrity, on-repudiation
• Firewalls, privacy protection, security
specification, encryption/decryption
• Formal analyses, group communications,
intrusion detection, anonymity
• Key management, trust establishment,
malicious parties' revocation, security
policies
• Fraudulent usage, prevention of traffic
analysis, denial of service
• PHY/MAC/routing protocols,
dependability/reliability, secure location
determination
• Performance evaluation,
performance/security tradeoff analysis
• Network forensics, design/analysis of
security protocols, security standards
© 2017 Inderscience Enterprises Ltd
www.inderscience.com/ijsn
International Journal ofSecurity andNetworks
IJSN A5 leaflet_9x_Layout 1 27/02/2017 15:08 Page 2