International Journal of Network Services & Technologies |
|
Guide for Authors IJNST will be committed to the timely publication of very high-quality, peer-reviewed, original papers that advance the state-of-the art and applications of network security. Topics will include, but not be limited to, the following: Biometric Security, Communications And Networks Security, Cryptography, Database Security, Electronic Commerce Security, Multimedia Security, System Security, etc. 1. Submission Procedure (1) Authors are strongly encouraged to submit their papers electronically by using online manuscript submission at http://ijnst.femto.com.tw/ (2) Authors can also submit their Word, ps or pdf file to the editor-in-chief via Email (cc.yang@nchu.edu.tw) 2. General 2.1 Length Limitation: All papers should be concisely written and be no longer than 30 double-spaced pages (12-point font, approximately 26 lines/page) including figures. 2.2 Title page 2.3 Corresponding author 2.4 References For a paper in a journal: M. S. Hwang, C. C. Chang, and K. F. Hwang, “An ElGamal-like cryptosystem for enciphering large messages,” IEEE Transactions on Knowledge and Data Engineering, vol. 14, no. 2, pp. 445-446, 2002. For a book: Dorothy E. R. Denning, Cryptography and Data Security. Massachusetts: Addison-Wesley, 1982. For a paper in a proceeding: M. S. Hwang, C. C. Lee, and Y. L. Tang, “Two simple batch verifying multiple digital signatures,” The Third International Conference on Information and Communication Security (ICICS2001), pp. 13-16, Xian, China, 2001. In text, references should be indicated by [number]. 2.5 Page charges 2.6 Author benefits
|
|