International Journal of Network Security
IJNS will be committed to the timely publication of very high-quality,
peer-reviewed, original papers that advance the state-of-the art and applications
of network security. Topics will include, but not be limited to, the
following: Biometric Security, Communications And Networks Security,
Cryptography, Database Security, Electronic Commerce Security, Multimedia
Security, System Security, etc.
1. Manuscript Style, Illustrations and
Photos
1.1 General
Articles must be written in good English.
Submission of an article implies that the work described has not been
published previously, that it is not under consideration for publication elsewhere.
It will not be published elsewhere in the same form, in English or in any
other language, without the written consent of the Publisher.
1.2 Format and Download
The authors don't care the
format in submitting phase. However, all accepted manuscripts must be written
in LaTeX format. Authors are responsible for
converting their manuscripts to LaTeX, if not
initially in LaTeX format. Figures should be in EPS
(if in Latex format). It is the authors' responsibility to prepare papers as
in IJNS's format. Accepted papers may not be published unless they meet
IJNS's formatting standard. Here you can view a sample file in Acrobat pdf
format (Download PDF) . You can download a sample file named IJNS_TEX_Format.zip
(Latex format), IJNS_TEX_Format.rar (Latex format).
1.3 Length Limitation
All papers should be
concisely written and be no longer than 12 pages including figures, tables,
and references.
1.4 Title page
The title page should
contain the article title, author(s) names and affiliations, address, an
abstract not exceeding 100 words, and a list of three to five keywords.
1.5 Corresponding author
Clearly indicate who is
willing to handle correspondence at all stages of refereeing and publication.
Ensure that telephone and fax numbers (with country and area code) are
provided in addition to the e-mail address and the complete postal address.
1.6 References
References should be listed alphabetically, in the
same way as follows:
For a paper in a journal: M.
S. Hwang, C. C. Chang, and K. F. Hwang, "An ElGamal-like cryptosystem
for enciphering large messages",IEEE
Transactions on Knowledge and Data Engineering, vol. 14, no. 2, pp.
445-446, 2002.
For a book: Dorothy E. R. Denning, Cryptography
and Data Security. Massachusetts: Addison-Wesley, 1982.
For a paper in a proceeding: M. S. Hwang,
C. C. Lee, and Y. L. Tang, "Two simple batch verifying multiple digital
signatures", The Third International Conference on Information and
Communication Security (ICICS2001), pp. 13-16, Xian, China, 2001.
In text, references should be indicated
by [number].
2. Submission Procedure
There are two options available for IJNS:
(1)
Authors are strongly encouraged to submit their
papers electronically by using online manuscript submission at (http://ijns.jalaxy.com.tw/author_login.jsp).
(2)
Authors can also submit their Word, ps or pdf file to the editor-in-chief via Email ( mshwang@asia.edu.tw ).
3. Copyright
After accepting paper,
the corresponding author should signed copyright
form, scan, and email the signed copyright form to me within 2 weeks (mshwang@nchu.edu.tw). You can download an unsigned copyright file named
IJNS-Copyright_Form.pdf (IJNS Copyright
Form).
4. Review Process
1-3 months for the
refereeing process and to inform the authors of the outcome of the refereeing
process. Papers should preferably be sent to 2-3 referees and must be amended
according to their comments. If one of referees rejects the manuscript,
Editor-in-Chief will reject the manuscript for publication in IJNS.
5. Publication Ethics
Academic ethics are the
necessary fundamental principle of research and the foundation for
scientists' and engineers' reputation. To promote academic integrity and
publish high-quality scientific works, International Journal of Network
Security (IJNS) issues the following Publication Ethics and Malpractice
Statement about the expected ethical behavior for all parties related to IJNS
publication, including the author, the peer reviewer, the IJNS editor, and
the publisher. Please refer the PUBLICATION
ETHICS AND MALPRACTICE STATEMENT
6. Article Publication Charge (APC)
After the manuscript is
accepted for publication, the author (or the
organization/university/institute/company or research fund where the author
belongs) will receive a good faith request for a reasonable fee to cover part
of the publishing costs. This is widely used and widely accepted throughout
the scientific publishing world. A detailed description of the payment will
be attached to the acceptance notice or certificate.
|