Example of International Journal of Internet Technology and Secured Transactions format
Recent searches

Example of International Journal of Internet Technology and Secured Transactions format Example of International Journal of Internet Technology and Secured Transactions format Example of International Journal of Internet Technology and Secured Transactions format Example of International Journal of Internet Technology and Secured Transactions format Example of International Journal of Internet Technology and Secured Transactions format Example of International Journal of Internet Technology and Secured Transactions format Example of International Journal of Internet Technology and Secured Transactions format
Sample paper formatted on SciSpace - SciSpace
This content is only for preview purposes. The original open access content can be found here.
Look Inside
Example of International Journal of Internet Technology and Secured Transactions format Example of International Journal of Internet Technology and Secured Transactions format Example of International Journal of Internet Technology and Secured Transactions format Example of International Journal of Internet Technology and Secured Transactions format Example of International Journal of Internet Technology and Secured Transactions format Example of International Journal of Internet Technology and Secured Transactions format Example of International Journal of Internet Technology and Secured Transactions format
Sample paper formatted on SciSpace - SciSpace
This content is only for preview purposes. The original open access content can be found here.
open access Open Access

International Journal of Internet Technology and Secured Transactions — Template for authors

Categories Rank Trend in last 3 yrs
Computer Networks and Communications #259 of 334 down down by 44 ranks
Computer Science Applications #538 of 693 down down by 71 ranks
journal-quality-icon Journal quality:
Low
calendar-icon Last 4 years overview: 126 Published Papers | 132 Citations
indexed-in-icon Indexed in: Scopus
last-updated-icon Last updated: 07/07/2020
Related journals
Insights
General info
Top papers
Popular templates
Get started guide
Why choose from SciSpace
FAQ

Related Journals

open access Open Access

Hindawi

Quality:  
High
CiteRatio: 5.0
SJR: 0.371
SNIP: 1.169
open access Open Access
recommended Recommended

IEEE

Quality:  
High
CiteRatio: 13.2
SJR: 1.207
SNIP: 3.106
open access Open Access
recommended Recommended

IEEE

Quality:  
High
CiteRatio: 10.8
SJR: 1.075
SNIP: 2.756

Journal Performance & Insights

CiteRatio

SCImago Journal Rank (SJR)

Source Normalized Impact per Paper (SNIP)

A measure of average citations received per peer-reviewed paper published in the journal.

Measures weighted citations received by the journal. Citation weighting depends on the categories and prestige of the citing journal.

Measures actual citations received relative to citations expected for the journal's category.

1.0

9% from 2019

CiteRatio for International Journal of Internet Technology and Secured Transactions from 2016 - 2020
Year Value
2020 1.0
2019 1.1
2018 0.6
2017 0.7
2016 0.6
graph view Graph view
table view Table view

0.17

5% from 2019

SJR for International Journal of Internet Technology and Secured Transactions from 2016 - 2020
Year Value
2020 0.17
2019 0.179
2018 0.134
2017 0.217
2016 0.133
graph view Graph view
table view Table view

0.463

1% from 2019

SNIP for International Journal of Internet Technology and Secured Transactions from 2016 - 2020
Year Value
2020 0.463
2019 0.459
2018 0.423
2017 0.329
2016 0.314
graph view Graph view
table view Table view

insights Insights

  • CiteRatio of this journal has decreased by 9% in last years.
  • This journal’s CiteRatio is in the top 10 percentile category.

insights Insights

  • SJR of this journal has decreased by 5% in last years.
  • This journal’s SJR is in the top 10 percentile category.

insights Insights

  • SNIP of this journal has increased by 1% in last years.
  • This journal’s SNIP is in the top 10 percentile category.

International Journal of Internet Technology and Secured Transactions

Guideline source: View

All company, product and service names used in this website are for identification purposes only. All product names, trademarks and registered trademarks are property of their respective owners.

Use of these names, trademarks and brands does not imply endorsement or affiliation. Disclaimer Notice

Inderscience Publishers

International Journal of Internet Technology and Secured Transactions

Approved by publishing and review experts on SciSpace, this template is built as per for International Journal of Internet Technology and Secured Transactions formatting guidelines as mentioned in Inderscience Publishers author instructions. The current version was created on 07 Jul 2020 and has been used by 717 authors to write and format their manuscripts to this journal.

i
Last updated on
07 Jul 2020
i
ISSN
1748-569X
i
Impact Factor
Low - 0.416
i
Open Access
No
i
Sherpa RoMEO Archiving Policy
Yellow faq
i
Plagiarism Check
Available via Turnitin
i
Endnote Style
Download Available
i
Bibliography Name
plainnat
i
Citation Type
Author Year
(Blonder et al., 1982)
i
Bibliography Example
Beenakker, C. W. J. (2006). ‘Specular Andreev Reflection in Graphene’. Phys. Rev. Lett., Vol 97, No 6, pp. 067007.

Top papers written in this journal

Journal Article DOI: 10.1504/IJITST.2010.037406
Characterising the robustness of complex networks
Ali Sydney1, Caterina Scoglio1, Mina Youssef1, Phillip Schumm1

Abstract:

With increasingly ambitious initiatives such as GENI and FIND that seek to design future internets, it becomes imperative to define the characteristics of robust topologies, and build future networks optimised for robustness. This paper investigates the characteristics of network topologies that maintain a high level of throu... With increasingly ambitious initiatives such as GENI and FIND that seek to design future internets, it becomes imperative to define the characteristics of robust topologies, and build future networks optimised for robustness. This paper investigates the characteristics of network topologies that maintain a high level of throughput in spite of multiple attacks. To this end, we select network topologies belonging to the main network models and some real world networks. We consider three types of attacks: removal of random nodes, high degree nodes, and high betweenness nodes. We use elasticity as our robustness measure and, through our analysis, illustrate different topologies that can have different degrees of robustness. In particular, elasticity can fall as low as 0.8% of the upper bound based on the attack employed. This result substantiates the need for optimised network topology design. Furthermore, we implement a trade-off function that combines elasticity under the three attack strategies and considers the cost of the network. Our extensive simulations show that, for a given network density, regular and semi-regular topologies can have higher degrees of robustness than heterogeneous topologies, and that link redundancy is a sufficient but not necessary condition for robustness. read more read less

Topics:

Robustness (computer science) (60%)60% related to the paper, Network topology (59%)59% related to the paper, Complex network (56%)56% related to the paper, Network model (52%)52% related to the paper
View PDF
34 Citations
Journal Article DOI: 10.1504/IJITST.2007.014837
PATROL: a comprehensive reputation-based trust model
Ayman Tajeddine1, Ayman Kayssi1, Ali Chehab1, Hassan Artail1

Abstract:

In this paper, we present PATROL, a general and comprehensive reputation-based trust model for distributed computing. The proposed model is an enhancement over our previous model, TRUMMAR, and aims at achieving a truly unique model that incorporates most concepts that are essential to determining trust-based decisions. Among ... In this paper, we present PATROL, a general and comprehensive reputation-based trust model for distributed computing. The proposed model is an enhancement over our previous model, TRUMMAR, and aims at achieving a truly unique model that incorporates most concepts that are essential to determining trust-based decisions. Among the concepts upon which the trust model is based are reputation values, direct experiences, trust in the credibility of a host to give recommendations, decay of information with time based on a dynamic decay factor, first impressions, similarity, popularity, activity, cooperation between hosts, in addition to a hierarchy of host systems. The simulations performed on this model confirm its correctness and its adaptability to different environments and situations. read more read less

Topics:

Computational trust (66%)66% related to the paper, Reputation (53%)53% related to the paper
29 Citations
Journal Article DOI: 10.1504/IJITST.2017.10008012
Blockchain and bitcoin as a way to lift a country out of poverty - tourism 2.0 and e-governance in the Republic of Moldova
Marc Pilkington1, Rodica Crudu1, Lee Gibson Grant1

Abstract:

In this article, we explore the formidable yet untapped capabilities of Blockchain technology and Bitcoin in order to alleviate poverty. We focus on the Republic of Moldova, which has been plagued by endemic corruption and persistently high poverty levels since her independence in 1991 following the collapse of the Soviet Uni... In this article, we explore the formidable yet untapped capabilities of Blockchain technology and Bitcoin in order to alleviate poverty. We focus on the Republic of Moldova, which has been plagued by endemic corruption and persistently high poverty levels since her independence in 1991 following the collapse of the Soviet Union. The transformative power of Blockchain technology and Bitcoin are then evidenced through a dual analysis of tourism 2.0 (with a real-world case study) and e-governance, which can contribute to increased inward capital investment flows, and help fight off corruption practices. Finally, we conclude that these new technologies constitute a significant step in the right direction, in order to break away from twenty-five years of disappointing socio-economic development performance. read more read less

Topics:

Corruption (52%)52% related to the paper
25 Citations
Journal Article DOI: 10.1504/IJITST.2010.037408
On the security issues of NFC enabled mobile phones
Lishoy Francis1, Gerhard P. Hancke1, Keith Mayes1, Konstantinos Markantonakis1

Abstract:

In this paper, we investigate the possibility that a Near Field Communication (NFC) enabled mobile phone, with an embedded secure element (SE), could be used as a mobile token cloning and skimming platform. We show how an attacker could use an NFC mobile phone as such an attack platform by exploiting the existing security con... In this paper, we investigate the possibility that a Near Field Communication (NFC) enabled mobile phone, with an embedded secure element (SE), could be used as a mobile token cloning and skimming platform. We show how an attacker could use an NFC mobile phone as such an attack platform by exploiting the existing security controls of the embedded SE and the available contactless APIs. To illustrate the feasibility of these actions, we also show how to practically skim and emulate certain tokens typically used in payment and access control applications with a NFC mobile phone. We also discuss how to capture and analyse legitimate transaction information from contactless systems. Although such attacks can also be implemented on other contactless platforms, such as custom-built card emulators and modified readers, the NFC enabled mobile phone has a legitimate form factor, which would be accepted by merchants and arouse less suspicion in public. Finally, we propose several security countermeasures for NFC phones that could prevent such misuse. read more read less

Topics:

Mobile phone (60%)60% related to the paper, Near field communication (55%)55% related to the paper, Security token (53%)53% related to the paper, Security controls (50%)50% related to the paper, Access control (50%)50% related to the paper
View PDF
25 Citations
Journal Article DOI: 10.1504/IJITST.2007.014839
Security analysis of mobile web service provisioning
Satish Narayana Srirama1, Matthias Jarke1, Wolfgang Prinz1

Abstract:

Mobile data services in combination with profluent web services are seemingly the path breaking domain in current information systems research. Mobile web services have vast application domains and effectively pave the way for exciting performance and security challenges. Though numerous standardised security specifications a... Mobile data services in combination with profluent web services are seemingly the path breaking domain in current information systems research. Mobile web services have vast application domains and effectively pave the way for exciting performance and security challenges. Though numerous standardised security specifications and implementations exist for web services in general, not much has been analysed and standardised for mobile web services. This paper explores some of the critical challenges in providing security to the mobile web services domain and addresses the realisation of security for mobile web service provisioning with special focus at our Mobile Host. read more read less

Topics:

Web application security (72%)72% related to the paper, Mobile Web (72%)72% related to the paper, Mobile search (70%)70% related to the paper, Web service (69%)69% related to the paper, WS-Security (67%)67% related to the paper
22 Citations
Author Pic

SciSpace is a very innovative solution to the formatting problem and existing providers, such as Mendeley or Word did not really evolve in recent years.

- Andreas Frutiger, Researcher, ETH Zurich, Institute for Biomedical Engineering

Get MS-Word and LaTeX output to any Journal within seconds
1
Choose a template
Select a template from a library of 40,000+ templates
2
Import a MS-Word file or start fresh
It takes only few seconds to import
3
View and edit your final output
SciSpace will automatically format your output to meet journal guidelines
4
Submit directly or Download
Submit to journal directly or Download in PDF, MS Word or LaTeX

(Before submission check for plagiarism via Turnitin)

clock Less than 3 minutes

What to expect from SciSpace?

Speed and accuracy over MS Word

''

With SciSpace, you do not need a word template for International Journal of Internet Technology and Secured Transactions.

It automatically formats your research paper to Inderscience Publishers formatting guidelines and citation style.

You can download a submission ready research paper in pdf, LaTeX and docx formats.

Time comparison

Time taken to format a paper and Compliance with guidelines

Plagiarism Reports via Turnitin

SciSpace has partnered with Turnitin, the leading provider of Plagiarism Check software.

Using this service, researchers can compare submissions against more than 170 million scholarly articles, a database of 70+ billion current and archived web pages. How Turnitin Integration works?

Turnitin Stats
Publisher Logos

Freedom from formatting guidelines

One editor, 100K journal formats – world's largest collection of journal templates

With such a huge verified library, what you need is already there.

publisher-logos

Easy support from all your favorite tools

International Journal of Internet Technology and Secured Transactions format uses plainnat citation style.

Automatically format and order your citations and bibliography in a click.

SciSpace allows imports from all reference managers like Mendeley, Zotero, Endnote, Google Scholar etc.

Frequently asked questions

1. Can I write International Journal of Internet Technology and Secured Transactions in LaTeX?

Absolutely not! Our tool has been designed to help you focus on writing. You can write your entire paper as per the International Journal of Internet Technology and Secured Transactions guidelines and auto format it.

2. Do you follow the International Journal of Internet Technology and Secured Transactions guidelines?

Yes, the template is compliant with the International Journal of Internet Technology and Secured Transactions guidelines. Our experts at SciSpace ensure that. If there are any changes to the journal's guidelines, we'll change our algorithm accordingly.

3. Can I cite my article in multiple styles in International Journal of Internet Technology and Secured Transactions?

Of course! We support all the top citation styles, such as APA style, MLA style, Vancouver style, Harvard style, and Chicago style. For example, when you write your paper and hit autoformat, our system will automatically update your article as per the International Journal of Internet Technology and Secured Transactions citation style.

4. Can I use the International Journal of Internet Technology and Secured Transactions templates for free?

Sign up for our free trial, and you'll be able to use all our features for seven days. You'll see how helpful they are and how inexpensive they are compared to other options, Especially for International Journal of Internet Technology and Secured Transactions.

5. Can I use a manuscript in International Journal of Internet Technology and Secured Transactions that I have written in MS Word?

Yes. You can choose the right template, copy-paste the contents from the word document, and click on auto-format. Once you're done, you'll have a publish-ready paper International Journal of Internet Technology and Secured Transactions that you can download at the end.

6. How long does it usually take you to format my papers in International Journal of Internet Technology and Secured Transactions?

It only takes a matter of seconds to edit your manuscript. Besides that, our intuitive editor saves you from writing and formatting it in International Journal of Internet Technology and Secured Transactions.

7. Where can I find the template for the International Journal of Internet Technology and Secured Transactions?

It is possible to find the Word template for any journal on Google. However, why use a template when you can write your entire manuscript on SciSpace , auto format it as per International Journal of Internet Technology and Secured Transactions's guidelines and download the same in Word, PDF and LaTeX formats? Give us a try!.

8. Can I reformat my paper to fit the International Journal of Internet Technology and Secured Transactions's guidelines?

Of course! You can do this using our intuitive editor. It's very easy. If you need help, our support team is always ready to assist you.

9. International Journal of Internet Technology and Secured Transactions an online tool or is there a desktop version?

SciSpace's International Journal of Internet Technology and Secured Transactions is currently available as an online tool. We're developing a desktop version, too. You can request (or upvote) any features that you think would be helpful for you and other researchers in the "feature request" section of your account once you've signed up with us.

10. I cannot find my template in your gallery. Can you create it for me like International Journal of Internet Technology and Secured Transactions?

Sure. You can request any template and we'll have it setup within a few days. You can find the request box in Journal Gallery on the right side bar under the heading, "Couldn't find the format you were looking for like International Journal of Internet Technology and Secured Transactions?”

11. What is the output that I would get after using International Journal of Internet Technology and Secured Transactions?

After writing your paper autoformatting in International Journal of Internet Technology and Secured Transactions, you can download it in multiple formats, viz., PDF, Docx, and LaTeX.

12. Is International Journal of Internet Technology and Secured Transactions's impact factor high enough that I should try publishing my article there?

To be honest, the answer is no. The impact factor is one of the many elements that determine the quality of a journal. Few of these factors include review board, rejection rates, frequency of inclusion in indexes, and Eigenfactor. You need to assess all these factors before you make your final call.

13. What is Sherpa RoMEO Archiving Policy for International Journal of Internet Technology and Secured Transactions?

SHERPA/RoMEO Database

We extracted this data from Sherpa Romeo to help researchers understand the access level of this journal in accordance with the Sherpa Romeo Archiving Policy for International Journal of Internet Technology and Secured Transactions. The table below indicates the level of access a journal has as per Sherpa Romeo's archiving policy.

RoMEO Colour Archiving policy
Green Can archive pre-print and post-print or publisher's version/PDF
Blue Can archive post-print (ie final draft post-refereeing) or publisher's version/PDF
Yellow Can archive pre-print (ie pre-refereeing)
White Archiving not formally supported
FYI:
  1. Pre-prints as being the version of the paper before peer review and
  2. Post-prints as being the version of the paper after peer-review, with revisions having been made.

14. What are the most common citation types In International Journal of Internet Technology and Secured Transactions?

The 5 most common citation types in order of usage for International Journal of Internet Technology and Secured Transactions are:.

S. No. Citation Style Type
1. Author Year
2. Numbered
3. Numbered (Superscripted)
4. Author Year (Cited Pages)
5. Footnote

15. How do I submit my article to the International Journal of Internet Technology and Secured Transactions?

It is possible to find the Word template for any journal on Google. However, why use a template when you can write your entire manuscript on SciSpace , auto format it as per International Journal of Internet Technology and Secured Transactions's guidelines and download the same in Word, PDF and LaTeX formats? Give us a try!.

16. Can I download International Journal of Internet Technology and Secured Transactions in Endnote format?

Yes, SciSpace provides this functionality. After signing up, you would need to import your existing references from Word or Bib file to SciSpace. Then SciSpace would allow you to download your references in International Journal of Internet Technology and Secured Transactions Endnote style according to Elsevier guidelines.

Fast and reliable,
built for complaince.

Instant formatting to 100% publisher guidelines on - SciSpace.

Available only on desktops 🖥

No word template required

Typset automatically formats your research paper to International Journal of Internet Technology and Secured Transactions formatting guidelines and citation style.

Verifed journal formats

One editor, 100K journal formats.
With the largest collection of verified journal formats, what you need is already there.

Trusted by academicians

I spent hours with MS word for reformatting. It was frustrating - plain and simple. With SciSpace, I can draft my manuscripts and once it is finished I can just submit. In case, I have to submit to another journal it is really just a button click instead of an afternoon of reformatting.

Andreas Frutiger
Researcher & Ex MS Word user
Use this template