SlideShare a Scribd company logo
International Journal on Cryptography and Information Security (IJCIS)
ISSN : 1839 - 8626
https://wireilla.com/ijcis/index.html
Scope & Topics
International Journal on Cryptography and Information Security (IJCIS) is an open access peer
reviewed journal that focuses on cutting-edge results in applied cryptography and Information
security. It aims to bring together scientists, researchers and students to exchange novel ideas and
results in all aspects of cryptography, coding and Information security.
Topics of interest include, but are not limited to the following
 Cryptographic protocols
 Cryptography and Coding
 Untrace ability
 Privacy and authentication
 Key management
 Authentication
 Trust Management
 Quantum cryptography
 Computational Intelligence in Security
 Artificial Immune Systems
 Biological & Evolutionary Computation
 Intelligent Agents and Systems
 Reinforcement & Unsupervised Learning
 Autonomy-Oriented Computing
 Coevolutionary Algorithms
 Fuzzy Systems
 Biometric Security
 Trust models and metrics
 Regulation and Trust Mechanisms
 Data Integrity
 Models for Authentication, Trust and
Authorization
 Wireless Network Security
 Information Hiding
 Data & System Integrity
 E- Commerce
 Access Control and Intrusion Detection
 Intrusion Detection and Vulnerability
Assessment
 Authentication and Non-repudiation
 Identification and Authentication
 Insider Threats and Countermeasures
 Intrusion Detection & Prevention
 Secure Cloud Computing
 Security Information Systems
Architecture and Design and Security
Patterns
 Security Management
 Security Requirements (threats,
vulnerabilities, risk, formal methods,
etc.)
 Sensor and Mobile Ad Hoc Network
Security
 Service and Systems Design and QoS
Network Security
 Software Security
 Security and Privacy in Mobile Systems
 Security and Privacy in
Pervasive/Ubiquitous Computing
 Security and Privacy in Web Sevices
 Security and Privacy Policies
 Security Area Control
 Security Deployment
 Security Engineering
 Security for Grid Computing
 Security in Distributed Systems
Paper Submission
Authors are invited to Submit papers for this journal through
the Email: ijcisjournal@wireilla.com or through Submission System Submissions must be
original and should not have been published previously or be under consideration for publication
while being evaluated for this Journal. For paper format download the template in this page.
Important Dates
 Submission Deadline: July 13 ,2025
 Notification : August 13 ,2025
 Final Manuscript Due: August 20 ,2025
 Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us : ijcisjournal@yahoo.com or ijcisjournal@wireilla.com
For other details: https://wireilla.com/ijcis/index.html
Submission System: Email: ijcisjournal@wireilla.com or through Submission System

More Related Content

PDF
International Journal on Cryptography and Information Security (IJCIS)
DOCX
International Journal on Cryptography and Information Security (IJCIS)
PDF
International Journal on Cryptography and Information Security (IJCIS)
PDF
International Journal on Cryptography and Information Security (IJCIS)
PDF
International Journal on Cryptography and Information Security (IJCIS)
PDF
International Journal on Cryptography and Information Security (IJCIS)
PDF
International Journal on Cryptography and Information Security (IJCIS)
PDF
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)

Similar to 13th International Conference on Soft Computing (SCOM 2025) (20)

PDF
International Journal on Cryptography and Information Security (IJCIS)
PDF
International Journal on Cryptography and Information Security (IJCIS)
PDF
International Journal on Cryptography and Information Security ( IJCIS)
PDF
International Journal on Cryptography and Information Security (IJCIS)
DOCX
International Journal on Cryptography and Information Security (IJCIS)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
RTF
DOCX
International Journal of Network Security & Its Applications (IJNSA)
DOCX
International Journal of Network Security &Its Applications (IJNSA)
DOCX
International Journal of Network Security & Its Applications (IJNSA)
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
Ad

Recently uploaded (20)

PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
Artificial Intelligence
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
Design Guidelines and solutions for Plastics parts
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
introduction to high performance computing
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPT
Total quality management ppt for engineering students
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Soil Improvement Techniques Note - Rabbi
R24 SURVEYING LAB MANUAL for civil enggi
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Artificial Intelligence
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Management Information system : MIS-e-Business Systems.pptx
Design Guidelines and solutions for Plastics parts
Fundamentals of Mechanical Engineering.pptx
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
distributed database system" (DDBS) is often used to refer to both the distri...
introduction to high performance computing
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Total quality management ppt for engineering students
III.4.1.2_The_Space_Environment.p pdffdf
Module 8- Technological and Communication Skills.pptx
Soil Improvement Techniques Note - Rabbi
Ad

13th International Conference on Soft Computing (SCOM 2025)

  • 1. International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839 - 8626 https://wireilla.com/ijcis/index.html Scope & Topics International Journal on Cryptography and Information Security (IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security. Topics of interest include, but are not limited to the following  Cryptographic protocols  Cryptography and Coding  Untrace ability  Privacy and authentication  Key management  Authentication  Trust Management  Quantum cryptography  Computational Intelligence in Security  Artificial Immune Systems  Biological & Evolutionary Computation  Intelligent Agents and Systems  Reinforcement & Unsupervised Learning  Autonomy-Oriented Computing  Coevolutionary Algorithms  Fuzzy Systems  Biometric Security  Trust models and metrics  Regulation and Trust Mechanisms  Data Integrity  Models for Authentication, Trust and Authorization  Wireless Network Security  Information Hiding  Data & System Integrity  E- Commerce  Access Control and Intrusion Detection  Intrusion Detection and Vulnerability Assessment  Authentication and Non-repudiation  Identification and Authentication  Insider Threats and Countermeasures  Intrusion Detection & Prevention  Secure Cloud Computing  Security Information Systems Architecture and Design and Security Patterns  Security Management  Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)  Sensor and Mobile Ad Hoc Network Security  Service and Systems Design and QoS Network Security  Software Security  Security and Privacy in Mobile Systems  Security and Privacy in Pervasive/Ubiquitous Computing  Security and Privacy in Web Sevices  Security and Privacy Policies  Security Area Control  Security Deployment  Security Engineering  Security for Grid Computing  Security in Distributed Systems
  • 2. Paper Submission Authors are invited to Submit papers for this journal through the Email: ijcisjournal@wireilla.com or through Submission System Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. For paper format download the template in this page. Important Dates  Submission Deadline: July 13 ,2025  Notification : August 13 ,2025  Final Manuscript Due: August 20 ,2025  Publication Date : Determined by the Editor-in-Chief Contact Us Here's where you can reach us : ijcisjournal@yahoo.com or ijcisjournal@wireilla.com For other details: https://wireilla.com/ijcis/index.html Submission System: Email: ijcisjournal@wireilla.com or through Submission System