JCS news

Please feel free forward to your colleagues and share the news of our journal

Dear Colleague,

Welcome to our journal newsletter for Journal of Computer Security (JCS). We are delighted to announce the publication of Volume 29, Issue 3.

The content from this new issue is included below, as well as details on how to submit your research to the journal.

Looking forward to working with you.

With kind regards,


Véronique Cortier
CNRS, Loria, France

Peng Liu
Pennsylvania State University, USA


Table of Contents

Volume 29, Issue 3

Lattice-based remote user authentication from reusable fuzzy signature
Tian, Yangguang | Li, Yingjiu | Deng, Robert H. | Sengupta, Binanda | Yang, Guomin

Resource and timing aspects of security protocols
Aires Urquiza, Abraão | Alturki, Musab A. | Ban Kirigin, Tajana | Kanovich, Max | Nigam, Vivek | Scedrov, Andre | Talcott, Carolyn

A new approach for detecting violation of data plane integrity in Software Defined Networks
Hessam, Ghandi | Saba, Ghassan | Alkhayat, M. Iyad

Research perspectives on fully homomorphic encryption models for cloud sectorOpenly available
Mittal, Sonam | Ramkumar, K.R.


Call for Papers

As a member of our research community, we would like to invite you to contribute your own work for publication in the journal. Journal of Computer Security offers contributing authors many benefits, including:

· First class Editorial Board

· Rigorous peer review and speedy manuscript processing

View the detailed Instructions to Authors.


Related publications


Please share the newsletter with your colleagues!

If you know any colleagues and fellow researchers who are not signed up to receive the JCS newsletter, we invite you to share this mailing with them.
To sign up for the newsletter, please click here.


You are receiving this mailing as you are signed up to receive news from JCS.
You can unsubscribe or alter your preferences at any time by clicking the links below.

Powered by Mad Mimi®A GoDaddy® company