Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
March 31, 2024

NOTIFICATION
April 30, 2024

PUBLICATION
May 31, 2024

    
HOME   About IJS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJS CITATION IMPACT
3.248

Refer to In-Process Citation Report for IJS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

IJS - Editorial Board Member (EBM)

Professor Xinyi Huang
Fujian Normal University - China
Contact Details
Email - xyhuang81@gmail.com
School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, Fujian, China, 350008
China

About Professor Xinyi Huang

Xinyi Huang received his Ph.D. degree from the School of Computer Science and Software Engineering, University of Wollongong, Australia. He is currently a Professor at the School of Mathematics and Computer Science, Fujian Normal University, China, and the Co-Director of Fujian Provincial Key Laboratory of Network Security and Cryptology.

His research interests include applied cryptography and network security. He has published over 100 research papers in refereed international conferences and journals. His work has been cited more than 1700 times at Google Scholar (H-Index: 23). He is an editor of several reputed journals and has served as the program/general chair or program committee member in over 60 international conferences.

Professor Xinyi Huang handles review of manuscripts that are submitted under the following topics.

  • Anonymity
  • Authentication
  • Cryptography and cryptanalysis
  • Formal security analyses
  • Public key cryptography and key management