Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2020

SUBMISSION
April 30, 2021

NOTIFICATION
May 31, 2021

PUBLICATION
June 30, 2021

HOME   About IJS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJS

CITATION ANALYSIS

IJS Citation Impact
(406 - 0) / 114 = 3.561

Refer to In-Process Citation Report for IJS for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Semantic Scholar
Academic Index
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

IJS - Editorial Board Member (EBM)

Professor Xinyi Huang
Fujian Normal University - China
Contact Details
Email - xyhuang81@gmail.com
School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, Fujian, China, 350008
China

About Professor Xinyi Huang

Xinyi Huang received his Ph.D. degree from the School of Computer Science and Software Engineering, University of Wollongong, Australia. He is currently a Professor at the School of Mathematics and Computer Science, Fujian Normal University, China, and the Co-Director of Fujian Provincial Key Laboratory of Network Security and Cryptology.

His research interests include applied cryptography and network security. He has published over 100 research papers in refereed international conferences and journals. His work has been cited more than 1700 times at Google Scholar (H-Index: 23). He is an editor of several reputed journals and has served as the program/general chair or program committee member in over 60 international conferences.

Professor Xinyi Huang handles review of manuscripts that are submitted under the following topics.

  • Anonymity
  • Authentication
  • Cryptography and cryptanalysis
  • Formal security analyses
  • Public key cryptography and key management