International Journal of Security and Its Applications





        Conference Calendar

        Conference Gallery


        Organizer Tools

        Conference Support



ISSN: 1738-9976

Vol.1, No.1, 2007
Vol.1, No.2, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016


Editor-in-Chief of the IJSIA Journal

Bharat Bhargava, Purdue University, USA

General Information of IJSIA

Bibliographic Information

  • ISSN: 1738-9976
  • Publisher: SERSC

    Science & Engineering Research Support soCiety


Contact Information

Science & Engineering Research Support soCiety

  • Management Office: 20 Virginia Court, Sandy Bay, Tasmania, Australia.
  • Phone no.: +61-3-9016-9027
  • Email:

Publication and Update

  • Last day of Every Month



Submission Information


Charge Information

(All taxes are included)

  • Publication fee will be $490 USD from 2015.
  • Printing Charges: You can download all papers from web site FREELY. However, if you want to get hardcopy and reprints, please fill up the printing and delivery form and please click the pay now button below for payments.
  • Printing and Delivery Form
  • Pay Now!


Journal Paper Publication Policy

  1. Every published paper is readily available in our Open Access repository (effective April 2013).
  2. Maximum of thirty-nine (39) papers can be included in each issue (effective April 2013).
  3. Each paper should have only one (1) corresponding author, and corresponding author cannot be changed (effective April 2013).
  4. If plagiarism problem was found, all authors of that paper cannot submit paper to our journal for three years.
    The paper will be removed even though it was published, and this will be noticed by home page (effective April 2013).
  5. If double submission was found, all authors of that paper cannot submit paper to our journal for three years.
    The paper will be removed even though it was published, and this will be noticed by home page (effective April 2013).
  6. Only paper containing simulation, implementation, case study or other evidence of research advancement can be published.
    Ideal paper can be published after getting permission from the editorial board (effective April 2013).
  7. Papers from one country cannot exceed 60% in each issue, it will be based by checking the first authors' nationality (effective July 2014).
  8. Only one (1) paper from same author can be included in each issue regardless of role and order (effective July 2014).
  9. SERSC DOES NOT ALLOW ANY AGENTS FROM CHINA to act on our behalf in collecting papers for our journals because SERSC have standard procedures in publication of submitted papers.

Journal Aims

IJSIA aims to facilitate and support research related to security and its applications.

Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security and its applications.

To bridge the gap of users who do not have access to major databases where one should pay for every downloaded article; this online publication platform is open to all readers as part of our commitment to global scientific society.

Journal Topics

The topics covered by IJSIA include the following:-

  • Access Control
  • Ad Hoc & Sensor Network Security
  • Applied Cryptography
  • Authentication and Non-repudiation
  • Cryptographic Protocols
  • Denial of Service
  • E-Commerce Security
  • Identity and Trust Management
  • Information Hiding
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Network & Wireless Security
  • Peer-to-Peer Security
  • Privacy and Anonymity
  • Secure installation, generation and operation
  • Security Analysis Methodologies
  • Security assurance
  • Security in Software Outsourcing
  • Security products or systems
  • Security technology
  • Systems and Data Security
  • Ubiquitous Computing Security

Editorial Board/Reviewers

  • Ahmet Koltuksuz, Izmir Institute of Technology, Turkey
  • Ajith Abraham, Norwegian University of Science and Technology, Norway
  • Alessandro Piva, University of Florence, Italy
  • Audun Josang, School of Software Engineering and Data Communications, Australia
  • Beniamino Di Martino, Second University of Naples, Italy
  • Bingyang Zhou, Austrailian Catholic University, Austraila
  • Brian King, Indiana University Purdue University Indianapolis, USA
  • Chin-Tser Huang, University of South Carolina, USA
  • D. P. Vakharia, S.V.N.I,T, India
  • Damien Sauveron, XLIM Laboratory, France
  • Dharma P. Agrawal, University of Cincinnati, USA
  • Dong Young Lee, Myoungji University, Korea
  • Edgar Weippl, Vienna University of Technology, Austria
  • Enrico Zio, Polytechnic of Milan, Italy
  • Frank Piessens, Katholieke Universiteit Leuven, Belgium
  • George Mohay, Queensland University of Technology, Australia
  • Geyong Min, University of Bradford, UK
  • Gildas Avoine, Massachusetts Institute of Technology, USA
  • Golden G. Richard III, University of New Orleans, USA
  • Hua Liu, Xerox labs, USA
  • Indrajit Ray, Colorado State University, USA
  • Javier Garcia-Villalba, Complutense University of Madrid, Spain
  • Javier Lopez, University of Malaga, Spain
  • Jayaprakash Kar, Al Musanna College of Technology, Sultanate of Oman
  • Jean-Jacques Quisquater, Universite catholique de Louvain, Belgium
  • Jeng-Shyang Pan, National Kaohsiung University of Applied Sciences, Taiwan
  • Jeno Bartalos, ICST, Europe
  • Jianhua Ma, Hosei University, Japan
  • Johnson Thomas, Oklahoma State University, USA
  • Jordi Castell, University of Wisconsin, USA
  • Jordi Forn, Technical University of Catalonia, Spain
  • Jun Bi, Tsinghua University, China
  • Karl Goeschka, Vienna University of Technology, Austria
  • Katrin Franke, Fraunhofer Institute, Germany
  • Kouich Sakurai, Kyushu University, Japan
  • Kyoungseok Kim, Chungbuk National University, Korea
  • Laurence T. Yang, St. Francis Xavier University, Canada
  • Marjan Kuchaki Rafsanjani, University of Kerman, Iran
  • N. Jaisankar, Manonmaniam Sundaranar University, India
  • R. Ravi, Kalasalingam University, India
  • Randy Tolentino, Hannam University, Korea
  • Rosslin John Robles, University of San Agustin, Philippines
  • S. U. Hwang, Hongik University, Korea
  • SeokSoo Kim, Hannam University, Korea
  • Shiguo Lian, France Telecom R&D Beijing, China
  • Suhas J. Manangi, Microsoft India, India
  • Sukumar Senthilkumar, Universiti Sains Malaysia, Malaysia
  • Tao Gong, Donghua University, China
  • Yu-Chen Hu, Providence University, Taiwan
  • Yuh-Min Tseng, National Changhua University of Education, Taiwan


IJSIA is indexed by:

  • ProQuest
  • DOAJ
  • J-Gate
  • Cabell
  • EI Compendex
  • Emerging Sources Citation Index (ESCI)

Editorial Secretary