International Journal of Cryptography and Security

Editor-in-Chief :
Publisher : Bioinfo Publications
ISSN : 2249-7013 (Print)     E-ISSN : 2249-7021 (Online)     Frequency : Yearly
Index Copernicus Value (ICV) : 6.91 (2012); 4.28 (2011)       CODEN : IJCRS
DOI : 10.9735/2249-7013       Abbreviation : Int J Cryptography Secur
Subject : Computer Science & Technology

Aim & Scope

* ***The journal ceased publication and is no longer accepting submissions.***

Journal publishes original Research Article, Editorial, Review Article, Rapid Communication, Case Report, Short Communications, Conference Proceedings, Special Issue Article, Mini Review, Annual Meeting Abstract, Letters, Observations with analysis and discussion.

Aim & Scope:
Access Control
Accountability
Agent Based Trust Management
Anonymity and Pseudonymity
Anti-Virus and Anti-Worms
Applied Cryptography
Artificial Immune Systems
Authentication and Authorization
Authentication and Non-repudiation
Autonomy-Oriented Computing
Biological & Evolutionary Computation
Biometric Security
Biometrics
Cloud, P2P,
Clusters and Grid Computing
Coevolutionary Algorithms
Computational Intelligence in Security
Computer Forensics
Contingency Planning
Cryptographic Protocols
Cryptography
Cryptography and Coding
Data & System Integrity
Data and System Integrity
Data Encryption
Data Integrity
Data Protection
Data/System Integrity
Database and System Security
Database Security
Decentralized Trust Management
Digital Right Management
Disaster Recovery
Distributed Systems Security
E- Commerce
Economics of Security and Privacy
Electronic Commerce Security
Electronic Frauds
E-mail security, Spam, Phishing, E-mail fraud
Embedded Security
Formal Methods in Security
Fraud Control
Fuzzy Systems
Grid Security
Identification and Authentication
Identity Management
Identity Management
Information Dissemination Control
Information Hiding and Watermarking
Information Privacy
Information Security Engineering
Insider Threats and Countermeasures
Intellectual Property Protection
Intelligent Agents and Systems
Internet Security & Applications
Intrusion Detection
Intrusion Detection & Prevention
Intrusion Detection and Prevention
Intrusion Detection and Vulnerability Assessment
Key Management and Key Recovery
Language-based Security
Mobile, Ad Hoc and Sensor Network Security
Models for Authentication, Trust and Authorization
Multimedia Content Management
Network and Wireless Network Security
Network Security
Operating System Security
Peer-to-Peer Network Security
Peer-to-peer Security
Performance Evaluations of Protocols
Pervasive Computation Trust
Policy of Trust in E-leaning systems
Privacy and authentication
QoS Network Security
Quantum cryptography
Regulation and Trust Mechanisms
Reinforcement & Unsupervised Learning
Risk Evaluation and Security Certification
Risk Management
Secure Cloud Computing
Secure Group Communications
Security & Network Management
Security and Privacy for Social Computing
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Web Sevices
Security and Privacy Policies
Security and Role of Trust
Security Application
Security Area Control
Security Deployment
Security Engineering
Security Evaluation
Security for Grid Computing
Security for Mobile Code
Security for Mobile Computing
Security in Distributed Systems
Security in Information Flow
Security in IT Outsourcing
Security in Location Services
Security in Social Networks
Security Information Systems
Security Management
Security Modeling and Architectures
Security Models
Security of E-commerce, E-business and E-government
Security Patterns
Security Protocols
Security Requirements
Security threats & countermeasures
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design
Signature and Key Agreement Protocol
Social Networks & Web 2.0 Trust Management
Software Security
System Security
Trust and Reputation Management
Trust in Service-Oriented Architecture
Trust Management
Trust Management for virtual organizations
Trust Management system for Wireless, mobile and sensor networks
Trust models and metrics
Trust Models and Trust Management Policies
Trust, Security, Privacy, Policy management
Trust/risk based security frameworks
Trusted Computing
Trustworthy Computing Technology
Ubiquitous Computing Security
Untraceability
Virus Reports
Virus, worms, Trojon Protection
Web 2.0 security
Web Security
Wireless Network Security
***