American Journal of Information Security

American Journal of Information Security
ISSN Print:
ISSN Online:
Frequency: Bimonthly
American Journal of Information Security
Recommend to Library

About This Journal

American Journal of Information Security (AJIS) is an open access, peer-reviewed journal that considers articles on all aspects of AJIS, the goal of this journal is to provide a platform and global forum for scientists and academicians all over the world to promote, share, and discuss various new issues and developments in different areas of AJIS. This journal targets researchers, scientists, and students who seek to advance the knowledge related to its scope.

All submitted manuscripts must be in English and will be processed to a rigorous and fair peer-review. Accepted papers will immediately publish online. The original papers should include but are not limited to the following subject areas of AJIS :

  •   Access control and foundations
  •   Anti-virus and anti-hacker measures
  •   Applications
  •   Applied cryptography
  •   Authentication
  •   Authentication and Authorization
  •   Biometric Security
  •   Content protection
  •   Cryptography
  •   Data and System Integrity
  •   Database Security
  •   Distributed Systems Security
  •   Electronic Commerce Security
  •   Firewalls
  •   Formal methods in information security
  •   Fraud Control
  •   Government
  •   Grid Security
  •   Health
  •   Identification
  •   Information Hiding and Watermarking
  •   Information Privacy
  •   Information Security Engineering
  •   Intellectual Property Protection
  •   Internet security
  •   Intrusion Detection
  •   Key Management and Key Recovery
  •   Language-based Security
  •   Mobile security
  •   Mobility
  •   Network Security
  •   Operating System Security
  •   Privacy
  •   Protocols
  •   Risk Evaluation and Security Certification
  •   Secure end systems
  •   Secure operating systems
  •   Security agents
  •   Security and Privacy for Social Computing
  •   Security Evaluation
  •   Security evaluation
  •   Security for Mobile Computing
  •   Security infrastructures
  •   Security Models
  •   Security Protocols
  •   Signature and Key Agreement Protocol
  •   Software protection
  •   Software Security
  •   System Security
  •   Tamper resistant software
  •   Telecommunications
  •   Trusted Computing and Trustworthy Computing Technology

The journal welcomes both applied and basic Research Articles, Reviews, Letters to the Editor, Meeting Reports, Methodology Articles, Short reports, Notes, Study Protocols and advertisements.

Join Editorial Board Submit a Manuscript

Editor In-Chef

Peer Reviewer