The Indian Journal of Cryptography and Network Security (IJCNS) has ISSN 2582-9238 (online) which is an online, open access🔗, peer reviewed🔗, periodical half yearly international journal. This journal is published by Lattice Science Publication (LSP)🔗 in the months of May and November.

The aim of the journal is to publish high quality peer–reviewed original articles in the area of Cryptography and Network Security that covers Cryptographic Protocols, Cryptography and Coding, Untrace-Ability, Privacy and Authentication, Key Management, Authentication, Trust Management, Quantum Cryptography, Computational Intelligence in Security, Artificial Immune Systems, Biological & Evolutionary, Computation, Intelligent Agents and Systems, Reinforcement & Unsupervised Learning, Autonomy-Oriented Computing, Coevolutionary Algorithms, Fuzzy Systems, Biometric Security, Trust Models and Metrics, Regulation and Trust Mechanisms, Data Integrity, Models for Authentication, Trust and Authorization, Wireless Network Security, Information Hiding, Data & System Integrity, Access Control and Intrusion Detection, Intrusion Detection and Vulnerability Assessment, Authentication and Non-Repudiation, Identification and Authentication Insider Threats and Countermeasures, Intrusion Detection & Prevention, Secure Cloud Computing, Security Information Systems Architecture and Design and Security Patterns, Security Management, Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.), Sensor and Mobile ad hoc Network Security, Service and Systems Design and QOS Network Security, System Security, Intrusion Detection, Secure end Systems, Secure Operating Systems, Data Base Security, Security Infrastructures, Security Evaluation, Software Security, Security and Privacy in Mobile Systems, Security and Privacy in Pervasive/Ubiquitous Computing, Security and Privacy in Web Services, Security and Privacy Policies, Security Area Control, Security Deployment, Security Engineering, Security for Grid Computing, Security in Distributed Systems, Network Security, Internet Security, Firewalls, Mobile Security, Security Agents, Protocols, Anti-Virus and Anti-Hacker Measures, Content Protection, Software Protection, Tamper Resistant Software, Electronic Commerce, Electronic Government, Health, Telecommunications, Mobility, Foundations, Privacy, Access Control, Authentication, Identification, Applied Cryptography and Formal Methods in Information Security.

Important Dates- 
Articles Submission Open for Volume-3 Issue-1, May 2023
Last Date of Article Submission: 30 April 2023
Date of Notification: 15 May 2023 
Date of Publication: 30 May 2023

Author (s) can submit articles electronically round the year. The Editors reserve the right to reject articles without sending them out for review. Submitted articles should not have been previously published or be currently under consideration for publication elsewhere. Briefs and research notes are not published in this journal. Submitted articles must be within the scope🔗 of the journal. All articles go through a double-blind peer review policy🔗

After the final acceptance of the article, based upon the detailed review process and submission of required documents, the article will publish online immediately. However, the assignment of the article of specific issue (see archive🔗) will be taken up by the editors🔗 later; and the author will be intimated accordingly. For theme based special issues, time bound special calls for articles will be announced.

All authors must know and keep in mind the editorial policy and the Publication Ethics and Malpractice Statement (PEMS)🔗. The Guidelines for the submission of articles, article preparation, format are to be found at Guidelines for Authors🔗 section. Publishing an article in a peer-reviewed🔗 journal is an essential building block in developing a coherent and respected network of knowledge. This is a direct reflection of the quality of the work of the authors and the organizations that support them. The peer-reviewed🔗articles support and embody the scientific method. It is therefore important to agree on the standards of ethical behavior expected of all parties involved in the act of publishing: authors, journal editors, peer reviewers, publishers and the society of journals owned or sponsored. The authors can read the publication ethics and policies which is available at https://www.ijcns.latticescipub.com/ethics-policies/

Basic Journal Details–
Website: www.ijcns.latticescipub.com
ISSN: 2582-9238 (Online)
DOI: https://doi.org/10.54105/ijcns
Publishing Frequency: 02 Issues per year (Half Yearly: May and November)
Published By: Lattice Science Publication (LSP)
First Volume/Issue Publishing Year: 2021
Journal Starting Year: 2021
Publication Language: English
Primary Field: Cryptography and Network Security
CrossRef: Yes
Peer Review Policy: https://www.ijcns.latticescipub.com/peer-review-policy/
Publication Ethics and Malpractice Statement (PEMS): https://www.ijcns.latticescipub.com/publication-ethics-and-publication-malpractice-statement/
Publication Ethics Policies: https://www.ijcns.latticescipub.com/ethics-policies/
Publisher License under: CC-BY-NC-ND 4.0🔗