Journal of Electrical and Computer Engineering

Innovations in Communications Security


Lead Editor

1Kean University, Union, USA

2National Institute of Informatics, Tokyo, Japan

3University of New Brunswick, Fredericton, NB, Canada

Innovations in Communications Security


Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients. It is often referred to by the abbreviation COMSEC. The field includes cryptosecurity, transmission security, and physical security of COMSEC equipment. COMSEC is used to protect both classified and unclassified traffic on military communications networks, including voice, video, and data. It is used for both analog and digital applications, as well as both wired and wireless links.

This feature topic will benefit the research community towards identifying challenges and disseminating the latest methodologies and solutions to communications security issues. Its objective is to publish high-quality articles presenting open issues, algorithms, protocols, policies, frameworks, standards, and solutions for communications related to security and privacy. Only technical papers describing previously unpublished, original, state-of-the-art research, and not currently under review by a conference or a journal will be considered.

Original research articles as well as review articles which address state-of-the-art research and state-of-the-practice industry experiences are welcomed. We solicit papers in a variety of topics related to communications security.

Potential topics include but are not limited to the following:

  • Authorization and access control for communications services
  • Denial of service prevention schemes for communications
  • Reliability and availability issues on communications
  • Penetration testing, intrusion detection, and prevention
  • End-to-end security solutions
  • Cryptographic protocols for communications
  • Voice security
  • Signaling security and privacy
  • Multimedia application security and privacy analysis
  • Multimedia communication platforms vulnerabilities and attacks
  • Security and privacy in mobile communication services
  • Smartphone multimedia apps security and privacy
  • Social networking security and privacy
  • Trust establishment in communications
  • Privacy and identity management
  • Privacy enhancing technologies for communications
  • Privacy models for communications
  • Security and privacy assessment for communications
  • Security policies
  • Auditing, verification, and validation of communications services
  • Cybersecurity issues affecting communications
  • VoIP peering security issues


  • Special Issue
  • - Volume 2016
  • - Article ID 4743084
  • - Editorial

Innovations in Communications Security

Mazdak Zamani | Isao Echizen | Arash Habibi Lashkari
  • Special Issue
  • - Volume 2016
  • - Article ID 2017373
  • - Research Article

Communication Behaviour-Based Big Data Application to Classify and Detect HTTP Automated Software

Manh Cong Tran | Yasuhiro Nakamura
  • Special Issue
  • - Volume 2016
  • - Article ID 4361719
  • - Research Article

The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios

Jingpei Wang | Jie Liu
  • Special Issue
  • - Volume 2016
  • - Article ID 3219042
  • - Research Article

A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing

Xinyue Cao | Zhangjie Fu | Xingming Sun
  • Special Issue
  • - Volume 2016
  • - Article ID 6567146
  • - Research Article

An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving

Hong Zhong | Song Li | ... | Chin-Chen Chang
  • Special Issue
  • - Volume 2016
  • - Article ID 2750268
  • - Research Article

Analysis and Improvement of Key Distribution Scheme for Secure Group Communication

Jia Ning Luo | Ming Hour Yang
  • Special Issue
  • - Volume 2016
  • - Article ID 9029745
  • - Research Article

A New Scalar Quantization Method for Digital Image Watermarking

Yevhen Zolotavkin | Martti Juhola
Journal of Electrical and Computer Engineering
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision93 days
Acceptance to publication17 days
Journal Citation Indicator0.480
Impact Factor2.4
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.