International Journal of Computer Network and Information Security

О журнале:

International Journal of Computer Network and Information Security (IJCNIS) is a peer reviewed journal in the field of Computer Network and Information Security. The journal is published 12 issues per year by the MECS Publisher from 2012. All papers will be blind reviewed. Accepted papers will be available on line (free access) and in printed version. No publication fee.

IJCNIS is publishing refereed, high quality original research papers in all areas of Computer Network and Information Security.

IJCNIS has been indexed by several world class databases: Google Scholar, Microsoft Academic Search, CrossRef, DOAJ, IndexCopernicus, INSPEC(IET), EBSCO, VINITI, JournalSeek, ULRICH's Periodicals Directory, WordCat, Scirus, Academic Journals Database, Stanford University Libraries, Cornell University Library, UniSA Library, CNKI Scholar, ProQuest, J-Gate, ZDB, BASE, OhioLINK, iThenticate, Open Access Articles, Open Science Directory, National Science Library of Chinese Academy of Sciences, The HKU Scholars Hub, etc..

The journal publishes original papers in the field of computer network and information security which covers, but not limited to the following scope:

New generation network and its application

Network architectures and protocols

Network University

Network Curriculum

Computer Network Education

Computer Distance Learning

IPV6

Wireless Network

Wireless sensors networking

Grid Computing

Cloud computing

Cluster Computing

Distributed computing

Peer-to-Peer network

RFID Technologies

E-commerce protocols

E-Health

Intrusion Detection and Prevention

Biometric Security and Artificial Intelligence

Cryptography and security protocols

Authentication and Identification

Mobile System Security

Security in social networks

Security for web services

Sensor and Mobile Ad Hoc Network

Security for Web Services

Security for Personal Data and Databases

Piracy detection and tracing

Denial of Service and other attacks

Management of Computing Security

Intelligent Multimedia Security Services

Channel Modeling and Characterization

Modulation/Coding/Signal Processing

B3G Systems, WiMAX and WLAN

Authentication, Authorization and Billing

Applications and Services for B3G/4G era

Radio Resource Management

Network measurement and Management

Theory and Models of Trust

Trust computing

Education of network

Bayesian Networks, Fuzzy and Rough Set

Intrusion Detection and Prevention

Biometric Security and Artificial Intelligence

Cryptography and security protocols

Authentication and Identification

Bayesian Networks, Fuzzy and Rough Set

Mobile System Security

Ubiquitous Computing Security

Sensor and Mobile Ad Hoc Network Security

Security in Wireless Network

Security of GSM/GPRS/UMTS systems

Security for Grid Computing

Security for Web Services

Security for Personal Data and Databases

Peer-to-Peer Security

Risk Assessment

Учредители:

Modern Education & Computer Science Press

IDR (ID Readera):
journal-1501004
ISSN:
Печатный 2074-9090. Электронный 2074-9104.

Еще выпуски журнала...

Статьи журнала

Tree-Based Matched RFID Yoking Making It More Practical and Efficient

Tree-Based Matched RFID Yoking Making It More Practical and Efficient

Hung-Yu Chien

Статья научная

A Radio Frequency Identification (RFID) yoking proof allows an off-line verifier to make sure whether two tags are simultaneously present. Due to off-line property, a reader cannot differentiate valid from invalid proof records when it probes tags, and would generate lots of useless data. This paper proposes a tree-based matched RFID yoking scheme which enhances the cost of identification from O(log N) to O(1), where N is the number of tags, and allows the reader to collect only those matched tags such that it significantly reduces useless data for the verifier to validate off-line.

Бесплатно

A Fair-Priority MAC design in Networked Control System

A Fair-Priority MAC design in Networked Control System

Hongjun Li,Xun Li,Hongxu Ma

Статья научная

Media Access Control (MAC) protocols in Wireless Networked Control System (WNCS) must minimize the radio energy costs in sensor nodes. Latency and throughput are also important design features for MAC protocols in the applications. But most of them cannot guarantee quality for real-time traffic. This paper studies the state of the art of current real-time MAC protocols, and then introduces a medium access control protocol and a improved protocol that provide multiple priority levels and hard real-time transmission. The channel is accessed by sensors according to their priorities. Sensors send frames in a round manner with same priority. The fairness between different priorities is provided. The channel access procedure is divided into two stages: broadcast period and transmission period. Simulation and experiment results indicate that our protocol provides high channel utilization and bounded delays for real-time communication and can be well applied in the many fields especially the dynamic wireless sensor networks.

Бесплатно

Performance Analysis of Cluster-based Wireless Sensor Networks with Application Constraints

Performance Analysis of Cluster-based Wireless Sensor Networks with Application Constraints

Abdul Sattar Malik,Jingming Kuang,Jiakang Liu,Wang Chong

Статья научная

Clustering is an efficient techniques used to achieve the specific performance requirements of large scale wireless sensor networks. In this paper we have carried out the performance analysis of cluster-based wireless sensor networks for different communication patterns formed due to application constraints based upon LEACH protocol, which is among the most popular clustering protocols proposed for these types of networks. Simulation results based upon this protocol identify some important factors that induce unbalanced energy consumption among sensor nodes and hence affect the network lifetime. This highlights the need for an adaptive clustering protocol that can increase the network lifetime by further balancing the energy consumption among sensor nodes. Paper concludes with some recommendations for such protocol.

Бесплатно

Using P systems to Solve the Discrete Logarithm Problem used in Diffie-Hellman Key Exchange Protocol

Using P systems to Solve the Discrete Logarithm Problem used in Diffie-Hellman Key Exchange Protocol

Xiaojing Ma,Zhitang Li,Hao Tu

Статья научная

The discrete logarithm problem has been used as the basis of several cryptosystems, especially the Diffie- Hellman key exchange protocol. P systems are a cluster of distributed parallel computing devices in a biochemical type. This paper presents a P system with active membranes and strong priority to solve the discrete logarithm problem used in Diffie-Hellman key exchange protocol. To the best of our knowledge, it’s the first time to solve the problem using P systems.

Бесплатно

Еще статьи журнала...

Журнал