Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
November 30, 2018

NOTIFICATION
December 31, 2018

PUBLICATION
January 31, 2019

HOME   About IJS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJS

CITATION ANALYSIS

IJS Citation Impact
(406 - 0) / 101 = 4.020

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Directory of Open Access Journals (DOAJ)
Google Scholar
Academic Journals Database
ScientificCommons
Academic Index
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

IJS EDITORIAL BOARD MEMBER

Professor Xinyi Huang
Fujian Normal University - China
Contact Details
Email - xyhuang81@gmail.com
School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, Fujian, China, 350008
China

ABOUT Professor Xinyi Huang

Xinyi Huang received his Ph.D. degree from the School of Computer Science and Software Engineering, University of Wollongong, Australia. He is currently a Professor at the School of Mathematics and Computer Science, Fujian Normal University, China, and the Co-Director of Fujian Provincial Key Laboratory of Network Security and Cryptology.

His research interests include applied cryptography and network security. He has published over 100 research papers in refereed international conferences and journals. His work has been cited more than 1700 times at Google Scholar (H-Index: 23). He is an editor of several reputed journals and has served as the program/general chair or program committee member in over 60 international conferences.

Professor Xinyi Huang handles review of manuscripts that are submitted under the following topics.

  • Anonymity
  • Authentication
  • Cryptography and cryptanalysis
  • Formal security analyses
  • Public key cryptography and key management