AIMS

The Indian Journal of Cryptography and Network Security (IJCNS) is half yearly international journal, being published in the months of May and November by Lattice Science Publication (LSP) Bhopal (M.P.), India since year 2021. The aim of the journal is to:

  1. disseminate original, scientific, theoretical or applied research in the field of Cryptography and Network Security of Computer Science.
  2. dispense a platform for publishing results and research with a strong empirical component.
  3. aqueduct the significant gap between research and practice by promoting the publication of original, novel, industry-relevant research.
  4. seek original and unpublished research article(s) based on theoretical and experimental works for the publication globally.
  5. publish original, theoretical and practical advances in Cryptography and Network Security of Computer Science.
  6. impart a platform for publishing results and research with a strong empirical component, to create a bridge for significant gap between research and practice by promoting the publication of original, novel, industry-relevant research.
  7. solicit original and unpublished research article(s), based on theoretical and experimental works.

SCOPE

The Indian Journal of Cryptography and Network Security (IJCNS) is not limited to a specific aspect of Cryptography and Network Security of Computer Science but is instead devoted to a wide range of subfields in the Cryptography and Network Security of Computer Science. While it encourages a broad spectrum of contribution in the Cryptography and Network Security of Computer Science, its core interest lies in issues concerning Cryptography and Network Security of Computer Science. Articles of interdisciplinary nature are particularly welcome.

The primary goal of the new editors is to maintain high quality of publications. There will be a commitment to expediting the time taken for the publication of the article(s). The articles that are sent for reviews will have names of the authors deleted with a view towards enhancing the objectivity and fairness of the review process.

Articles that are devoted to the purely mathematical aspects without a discussion of the physical implications of the results or the consideration of specific examples are discouraged. Articles concerning Cryptography and Network Security of Computer Science should not be limited merely to a description and recording of observations but should contain theoretical and quantitative discussion of the results.

The Editors reserve the right to reject article(s) without sending them out for review. Articles for the Regular Issue of the journal can submit, round the year, electronically by using Article Submission System. The summited article (s) should cover following subfields of Cryptography and Network Security of Computer Science:  

  • Cryptographic Protocols
  • Cryptography and Coding
  • Untrace-Ability
  • Privacy and Authentication
  • Key Management
  • Authentication
  • Trust Management
  • Quantum Cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological & Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement & Unsupervised Learning
  • Autonomy-Oriented Computing
  • Coevolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust Models and Metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication
  • Trust and Authorization
  • Wireless Network Security
  • Information Hiding
  • Data & System Integrity
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-Repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
  • Sensor and Mobile ad hoc Network Security
  • Service and Systems Design and QOS Network Security
  • System Security
  • Intrusion Detection
  • Secure end Systems
  • Secure Operating Systems
  • Data Base Security
  • Security Infrastructures
  • Security Evaluation
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems
  • Network Security
  • Internet Security
  • Firewalls
  • Mobile Security
  • Security Agents
  • Protocols
  • Anti-Virus and Anti-Hacker Measures
  • Content Protection
  • Software Protection
  • Tamper Resistant Software
  • Electronic Commerce
  • Electronic Government
  • Health
  • Telecommunications
  • Mobility
  • Foundations
  • Privacy
  • Access Control
  • Authentication
  • Identification
  • Applied Cryptography
  • Formal Methods in Information Security