Journal of Internet Technology and Secured Transaction (JITST)

Welcome to JITST

The Journal of Internet Technology and Secured Transactions (JITST)  is a peer-reviewed and open-access journal. JITST is the official journal of the International Conference for Internet Technology and Secured Transactions (ICITST). The JITST provides an international forum for electronic publication of high-quality scholarly papers in Internet Technology and Secured Transactions. Authors retain the publishing rights without restrictions.

The objectives of the JITST are to bridge the knowledge gap between academia and industry, and provide free access to current research work. We invite research papers that encompass conceptual analysis, design implementation and performance evaluation.

The topics in JITST include but are not confined to the following areas:

Internet Application and Technology

  • Application Agents
  • Artificial Intelligence and Expert Systems
  • Bitcoin
  • Blockchain
  • Boundary Issues of Internet Security
  • Broadband Access Technologies
  • Database Management
  • Data Models for Production Systems and Services
  • Defence Systems
  • Content-based Network Services
  • Embedded Systems
  • Internet Technologies
  • Internet Architecture
  • Internet of things
  • IPSec Quality of Service
  • Knowledge Management
  • Web Analytics

Information Security

  • Authentication Techniques
  • Biometrics
  • Chaos-based Data Security
  • Collaborative Learning
  • Cryptography
  • Cyber Security
  • Digital Forensics and Crimes
  • Ethical Hackers
  • Network Security Issues and Protocols
  • Organisation Considerations in Security Policy Formulation and Implementations
  • Security Challenges and Content Authoring
  • Secure Communications
  • MANET Security
  • Trust, Privacy and Data Security
  • Wireless Sensor Network Security

Ubi/Cloud Computing

  • Authentication and Access Control for Data Protection in Ubi/Cloud Computing
  • Context-Awareness and its Data Mining for UbiCom
  • Data Grids
  • Distributed Information Systems
  • Human-Computer Interface and Interaction for UbiCom
  • New Novel Mechanism and Application for Ubi/Cloud Computing
  • Peer to Peer Data Management
  • Smart Homes and its Business Model for UbiCom Service
  • Security and Data Management for UbiCom
  • Ubiquitous Systems
  • USN/RFID Service

Infonomics and e-Technology

  • e-Business
  • e-Commerce
  • e-Government
  • e-Learning
  • e-Society
  • Infonomics
  • Information Management
  • Information Quality
  • Information Visualization
  • Technology-Enabled Information
  • Synchronizing e-Security
  • System Design and Security for e-Services
  • Wearable

Multimedia and Web Services

  • Data center and Cloud Computing
  • Digital Economy and Blockchain
  • Intelligent Multimedia and Data Management
  • Multimedia Information Systems
  • Multimedia protocols
  • Multimedia Security
  • Online Social Networks (OSNs)
  • Semantic Web and Ontology
  • Social Business Intelligence
  • Social Media
  • Web Databases
  • Web Metrics and its Applications
  • Web Mining including Web Intelligence and Web 3.0.
  • Web Services
  • XML and other Extensible Languages

Cloud Security

  • Cloud Audit Protocol
  • Cloud Requirements for PaaS and SaaS
  • Cryptographic Enforcement of Multi-Tenancy
  • Secure Virtual Infrastructure and Private Cloud
  • Security Policy and Privacy Requirements

Research in Progress

  • Collaborative Research
  • Future Technologies