Journal of Electrical and Computer Engineering

Innovations in Communications Security


Status
Published

Lead Editor

1Kean University, Union, USA

2National Institute of Informatics, Tokyo, Japan

3University of New Brunswick, Fredericton, NB, Canada


Innovations in Communications Security

Description

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients. It is often referred to by the abbreviation COMSEC. The field includes cryptosecurity, transmission security, and physical security of COMSEC equipment. COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, as well as both wired and wireless links.

This feature topic will benefit the research community towards identifying challenges and disseminating the latest methodologies and solutions to communications security issues. Its objective is to publish high-quality articles presenting open issues, algorithms, protocols, policies, frameworks, standards, and solutions for communications related to security and privacy. Only technical papers describing previously unpublished, original, state-of-the-art research, and not currently under review by a conference or a journal will be considered.

Original research articles as well as review articles which address state-of-the-art research and state-of-the-practice industry experiences are welcomed. We solicit papers in a variety of topics related to communications security.

Potential topics include but are not limited to the following:

  • Authorization and access control for communications services
  • Denial of service prevention schemes for communications
  • Reliability and availability issues on communications
  • Penetration testing, intrusion detection, and prevention
  • End-to-end security solutions
  • Cryptographic protocols for communications
  • Voice security
  • Signaling security and privacy
  • Multimedia application security and privacy analysis
  • Multimedia communication platforms vulnerabilities and attacks
  • Security and privacy in mobile communication services
  • Smartphone multimedia apps security and privacy
  • Social networking security and privacy
  • Trust establishment in communications
  • Privacy and identity management
  • Privacy enhancing technologies for communications
  • Privacy models for communications
  • Security and privacy assessment for communications
  • Security policies
  • Auditing, verification, and validation of communications services
  • Cybersecurity issues affecting communications
  • VoIP peering security issues

Articles

  • Special Issue
  • - Volume 2016
  • - Article ID 4743084
  • - Editorial

Innovations in Communications Security

Mazdak Zamani | Isao Echizen | Arash Habibi Lashkari
  • Special Issue
  • - Volume 2016
  • - Article ID 2017373
  • - Research Article

Communication Behaviour-Based Big Data Application to Classify and Detect HTTP Automated Software

Manh Cong Tran | Yasuhiro Nakamura
  • Special Issue
  • - Volume 2016
  • - Article ID 4361719
  • - Research Article

The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios

Jingpei Wang | Jie Liu
  • Special Issue
  • - Volume 2016
  • - Article ID 3219042
  • - Research Article

A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing

Xinyue Cao | Zhangjie Fu | Xingming Sun
  • Special Issue
  • - Volume 2016
  • - Article ID 6567146
  • - Research Article

An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving

Hong Zhong | Song Li | ... | Chin-Chen Chang
  • Special Issue
  • - Volume 2016
  • - Article ID 2750268
  • - Research Article

Analysis and Improvement of Key Distribution Scheme for Secure Group Communication

Jia Ning Luo | Ming Hour Yang
  • Special Issue
  • - Volume 2016
  • - Article ID 9029745
  • - Research Article

A New Scalar Quantization Method for Digital Image Watermarking

Yevhen Zolotavkin | Martti Juhola
Journal of Electrical and Computer Engineering
 Journal metrics
Acceptance rate17%
Submission to final decision90 days
Acceptance to publication37 days
CiteScore2.900
Impact Factor-
 Submit

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.