Journal of Internet Technology and Secured Transaction

Welcome to JITST

The Journal of Internet Technology and Secured Transactions (JITST)  is a peer-reviewed and open-access journal. The JITST provides an international forum for electronic publication of high-quality scholarly papers in Internet Technology and Secured Transactions. The peer review process and publications in the JITST are free (no fees apply). Authors retain the publishing rights without restrictions.

The objectives of the JITST are to bridge the knowledge gap between academia and industry, and provide free access to current research work. We invite research papers that encompass conceptual analysis, design implementation and performance evaluation.

The topics in JITST include but are not confined to the following areas:

Internet Application and Technology

  • Application Agents
  • Artificial Intelligence and Expert Systems
  • Boundary Issues of Internet Security
  • Broadband Access Technologies
  • Database Management
  • Data Models for Production Systems and Services
  • Defence Systems
  • Content-based Network Services
  • Embedded Systems
  • Internet Technologies
  • Internet Architecture
  • Internet of things
  • IPSec Quality of Service
  • Knowledge Management

Information Security

  • Authentication Techniques
  • Biometrics
  • Chaos-based Data Security
  • Collaborative Learning
  • Cryptography
  • Cyber Security
  • Digital Forensics and Crimes
  • Network Security Issues and Protocols
  • Organization Considerations in Security Policy Formulation and Implementations
  • Security Challenges and Content Authoring
  • Secure Communications
  • MANET Security
  • Trust, Privacy and Data Security
  • Wireless Sensor Network Security

Ubi/Cloud Computing

  • Authentication and Access Control for Data Protection in Ubi/Cloud Computing
  • Context-Awareness and its Data Mining for UbiCom
  • Data Grids
  • Distributed Information Systems
  • Human-Computer Interface and Interaction for UbiCom
  • New Novel Mechanism and Application for Ubi/Cloud Computing
  • Peer to Peer Data Management
  • Smart Homes and its Business Model for UbiCom Service
  • Security and Data Management for UbiCom
  • Ubiquitous Systems
  • USN/RFID Service

Infonomics and e-Technology

  • e-Business
  • e-Commerce
  • e-Government
  • e-Society
  • Infonomics
  • Information Management
  • Information Quality
  • Information Visualization
  • Technology-Enabled Information
  • e-Learning
  • Synchronizing e-Security
  • System Design and Security for e-Services

Multimedia and Web Services

  • Data center and Cloud Computing
  • Intelligent Multimedia and Data Management
  • Multimedia Information Systems
  • Multimedia protocols
  • Multimedia Security
  • Semantic Web and Ontology
  • Web Databases
  • Web Metrics and its Applications
  • Web Mining including Web Intelligence and Web 3.0.
  • Web Services
  • XML and other Extensible Languages

Cloud Security

  • Cloud Audit Protocol
  • Cloud Requirements for PaaS and SaaS
  • Cryptographic Enforcement of Multi-Tenancy
  • Secure Virtual Infrastructure and Private Cloud
  • Security Policy and Privacy Requirements

Research in Progress

  • Collaborative Research
  • Future Technologies