Call for papers - Special issue of "Computer Security Technologies to be Indispensable to the Society"

July 7, 2014
Updated on November 28, 2014
Editorial Committee of the Journal of Information Processing

Journal of Information Processing (JIP) is pleased to announce the call for papers for a special issue of "Computer Security Technologies to be Indispensable to the Society".
This special issue will focus on papers that describe such computer security technologies in terms of basic theories and techniques, protocols, architectures, software systems, applications and implementations, operation and management, and social-scientific analyses. Original papers, as well as papers that have been presented at domestic and international workshops, symposiums, and conferences, will be welcomed.

Journal of Information Processing (JIP) is currently encouraging more submissions from outside of Japan.
Any papers electronically submitted to JIP before July 31, 2015 are free of publication charge when accepted.

Submission Guidelines

(1) All papers must be submitted electronically. Please access the following URL and proceed under the submission instructions:
*Note that this URL is for English papers only.
If you plan to submit a paper in Japanese, please visit another page at

(2) All papers will be reviewed. The review process will be carried out in the same manner as regular issues. However, you have shorter time than usual (two months) for preparation of your responses to inquiries.

(3) Submission deadline is November 28th, 2014 December 5, 2014. *Deadline extended

(4) The special issue will be published on the J-Stage website in September, 2015. Preprint will be published on the IPSJ Journal in September, 2015.

(5) The Editorial Committee of This Special Issue
Editor in-Chief: Masahiro MAMBO (Kanazawa Univ.)
Editorial Board: Takao OKUBO (Institute of Information Security), Isao ECHIZEN (National Institute of Informatics)
Editorial Committee: Daisuke INOUE (National Institute of Information and Communications Technology), Koji CHIDA (NTT Corp.), Hiroshi DOI (Institute of Information Security), Sadayuki HONGO (Hokkaido Institute of Technology), Keiichi IWAMURA (Tokyo Univ. of Science), Takehisa KATO (IPA), Hiroaki KIKUCHI (Meiji Univ.), Takashi MATSUNAKA (KDDI R&D Laboratories Inc.), Kanta MATSUURA (The Univ. of Tokyo), Atsuko MIYAJI (Japan Advanced Institute of Science and Technology), Koichi MOURI (Ritsumeikan Univ.), Yuko MURAYAMA (Iwate Prefectural Univ.), Toru NAKANISHI (Hiroshima Univ.), Masakatsu NISHIGAKI (Shizuoka Univ.), Ryo NOJIMA (National Institute of Information and Communications Technology), Toshihiro OHIGASHI (Hiroshima Univ.), Eiji OKAMOTO (Univ. of Tsukuba), Takeshi OKAMOTO (Tsukuba Univ. of Technology ), Mirang PARK (Kanagawa Institute of Technology), Takamichi SAITO (Meiji Univ.), Ryoichi SASAKI (Tokyo Denki Univ.), Yuji SUGA (IIJ Inc.), Koutarou SUZUKI (NTT Corp.), Tsuyoshi TAKAGI (Kyushu Univ.), Hiroki TAKAKURA (Nagoya Univ.), Kiyoshi TANAKA (Shinshu Univ.), Masato TERADA (Hitachi Ltd.), Masayuki TERADA (NTT docomo, Inc.), Satoru TEZUKA (Tokyo Univ. of Technology), Satoru TORII (Fujitsu Laboratories Ltd.), Yuji WATANABE (IBM Japan, Ltd.), Toshihiro YAMAUCHI (Okayama Univ.), Katsunari YOSHIOKA (Yokohama National Univ.), Hiroshi YOSHIURA (Univ. of Electro-Communications)

Contact to Technical Activity Section