Journal of Secure Communication and System

Editor-in-ChiefShengzhi Zhang

ISSN: 2529-7678 (Online)

Journal Abbreviation: J Secur Commun Syst

Publication Frequency: irregular

Article Processing Charges (APC): Click here for more details

Publishing Model: Open Access

Journal no: 20P

About the Journal

Journal of Secure Communication and System is an international Open Access journal that publishes original research articles and review articles related to all areas of secure communication and system. 

Recently Published Articles

Original Research Articles

Yi Cao
7 Views, 23 PDF Downloads

QQ is China's most widely used instant messaging tool, its security for user security and network security has an
important impact. Once a QQ account is hacked, the harm and the impact is terrible, the user loses a lot of friend’s
information and contact information in a short time and is diffi cult to completely recover. This article will analyze
the security of QQ’s landing agreement, analyze its security, and point out the security vulnerabilities which exist,
and explain the possible attacks that QQ may suff er, and make suggestions for improvement and ways to enhance the
security of QQ communication. In addition, this article also conducts a corresponding study of QQ hacking, and puts
forward precautionary approaches.


Original Research Articles

Chai Jianwen
5 Views, 28 PDF Downloads

This paper mainly studies the basic concept of baseband transmission of digital signal and the transmission process
of digital signal baseband transmission and how to design digital baseband transmission system with MATLAB
software simulation. This paper fi rst introduces the theoretical basis of this subject, including digital communication,
the composition of digital baseband transmission system and digital baseband signal transmission process. Then the
paper introduced the characteristics of digital baseband transmission system, including digital PAM signal power
density and common line pattern, and by comparing choosing the fi nal bipolar zero return code. Then we introduced
the MATLAB simulation software. The conditions of the best reception of the digital baseband signal are described
and how the waveform of the baseband signal is observed by an oscilloscope. Finally, according to the basic steps
of simulation process, the simulation process of digital baseband transmission system is realized by MATLAB
simulation tool, and the system is analyzed.


Original Research Articles

xie Wenjun

We know that today's society is the information society. The highly developed information society requires that
the communication network can provide a wide variety of telecommunication services. The amount of information
transmitted, exchanged and processed through the communication network will increase, which requires the modern
communication network to be digitalized, integrated, intelligent and personalized. The transmission system is an
important part of the communication network, directly restricting the development of the communication network.
One of the most important developments in the world to develop the information superhighway, with one of the
key is to set up a large capacity transmission fiber network, continuously improve the transmission line on the
signal rate, widening the transmission band. It is like expanding capacity to accommodate a large number of traffi c
in highways. At the same time the user wants the transmission network to have a worldwide interface standard, to
access to global village, in where every user can easily communicate anytime and anywhere. Synchronous Digital
Hierarchy (SDH) is a comprehensive information transmission network that integrates multiplexing, line transmission
and switching functions and is operated by a unifi ed network management system. It is a synchronous information
transmission network developed by Bell Communication Technology Research Institute’s optical network (SONET).
The International Telegraph and Telephone Advisory Committee (now ITU-T) received the SONET concept in 1988
and renamed it SDH, making it a general technology system that applies not only to fiber but also to microwave
and satellite transmission. It is applied for eff ective management of network, real-time service monitoring, dynamic
network maintenance, interoperability between different vendors and other functions, greatly improves network
resource utilization, reduce management and maintenance costs, flexible and reliable and efficient network
operation and maintenance. So it is in the center of attention in world's information fi eld of transmission technology
development and application.

Original Research Articles

Mu Jinsheng
6 Views, 24 PDF Downloads

With the development of economy, the improvement of people's living standard has been increasing and the
construction of buildings is becoming more demanding. These buildings are large in scale and of good quality and
have a strong shielding effect on mobile phone signals. In the middle of the large-scale buildings, underground
shopping malls, underground parking and other environments, the mobile communication signal is weak hence the
phone cannot be used normally and forming a mobile communication blind area and shadow area. In the middle
fl oor, due to the surrounding diff erent base station signal overlap, the ping-pong eff ect, frequent switching of mobile
phones and even dropped calls are seriously aff ecting the normal use of mobile phones. In the building's higher fl oors,
due to the height of the base station antenna, it has abnormal coverage and there is also mobile communication blind
spot. In addition, in some buildings, although the phone can answer normal call but the user density, base station
channel congestion and mobile phone line is diffi cult. In particular, the network coverage, capacity and quality of
mobile communication are the key factors for operators to gain competitive advantage. Network coverage, network
capacity and network quality fundamentally refl ects the mobile network service level and is the theme of all mobile
network optimization work. The indoor coverage system is produced under this background. According to the relevant
statistics in some areas of indoor traffi c in the total traffi c accounted for a higher proportion. Therefore, strengthening
the indoor coverage is of great signifi cance to improve the quality of mobile communication.


Original Research Articles

Lin Jun
11 Views, 29 PDF Downloads

This paper introduces the development background of mobile communication and the development of mobile
communication. It introduces the application principle, network structure, main technology, the advantages and
disadvantages of the three generations of mobile communication system respectively, and introduces the current
third generation mobile communication system, including its technical support and research direction, analysis and
comparison of the European WCDMA system, the United States CDMA2000 system and China's TD-SCDMA system
technical characteristics. Finally, the development trend and prospect of future mobile communication system are

Read more

Indexing and Archiving

Journal of Secure Communication and System (JSCS) aims to be indexed by world-recognized databases, for example, PubMed, Scopus and Science Citation Index (SCI). JSCS has been indexed and archived by several databases:

Editorial Board


Shengzhi Zhang, Florida Institute of Technology, Melbourne, FL, USA

Editorial Board

Kai Chen, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Deguang Kong, Samsung Research America Silicon Valley, Mountain View, CA, USA
Heather Crawfor, Florida Institute of Technology, Melbourne, FL, USA
Xiaoqi Jia, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Xuetao Wei, School of Information Technology, University of Cincinnati, Cincinnati, OH, USA
Wenjie Wang, IOT Group, Intel, Shanghai, China

Focus and Scope

Journal of Secure Communication and System is an international Open Access journal that publishes original research articles and review articles related to all areas of communication and system security. The scope includes network security, computer systems, imaging, software development, cyber-crime, electronic manufacturing services, digital instrumentation solutions.

For Authors

  • A manuscript would not be accepted if it has been published or is currently under consideration for publication in any other journals. The author will need to notify the editorial team if the data in their submission has been presented in conferences.

  • Authorship should be limited to people who have contributed substantially to the work. Authors must indicate their specific contributions to the published work. This information should be listed in the manuscript under the section ‘Author Contribution’. Examples of contributions include: designed research, performed research, contributed new reagents or analytic tools, analyzed data, wrote the paper.

    For more information on submission’s format, please refer to the ‘Author Guidelines’ link accessible from the ‘About’ button at the top row of this page.

    The corresponding author should be clearly indicated for all manuscripts submitted. A maximum of two corresponding authors are allowed for the responsibilities associated. The corresponding author(s) is responsible for:

    • Obtaining permission from all the authors mentioned in the manuscript
    • Ensuring adherence to all editorial and submission policies and for any communications and actions that may be necessary after publication
    • Including written permission from the authors of the work concerned for any mention of any unpublished material included in the manuscript, e.g. data from manuscripts-in-press, personal communication, or work in preparation.
  • The author has to provide the authorization of no conflict with any financial body or funding agency that might influence the results or interpretation of their manuscript. All authors, members, reviewers and editors must disclose any association that poses a conflict of interest in connection with the manuscript. The corresponding author will be asked to sign a form behalf of all of the authors regarding potential conflicts of interest at the time of acceptance.

  • The editorial team does not approve of any plagiarism attempts. iThenticate will be utilized at the editor’s discretion to verify the originality of submitted manuscripts. If plagiarism is detected during the review process the manuscript may be rejected pending the severity of plagiarism. Therefore, if a manuscript uses a text copied directly from another source, this text must be written in quotation marks and the original source must be cited.

  • All articles must be written in English — preferably American English. SI units should be used. If you are not a native English speaker, you may want to utilize an external or Whioce Publishing’s optional professional language editing service before submitting the final version.

  • Whioce Publishing Pte Ltd offers its own professional editing services. By using this service, you can be sure that your English-language manuscript will be polished and ready for submission to your publication of choice at a very reasonable price. For further details about the Language Editing Services, please contact us at Please note that utilizing a language editing service is not a guarantee of acceptance.

  • Revised manuscripts must contain a detailed point by point response to the comments of the reviewers. The response to reviewers has to be uploaded as a separate file.

  • If you withdraw your manuscript after it has been accepted (but not yet published), you will be charged for costs incurred at USD200.

  • Authors are expected to have minimum amount of post-acquisition processing of data. In case of processing; alterations must be applied to the entire image (e.g., brightness, contrast, color balance). Any kind of alteration if being done has to be clearly stated in the figure legend and in Methods section.

    Grouping of data (e.g., cropping of images of removal of lanes from gels and bolts) must be made apparent and should be explicitly indicated in the appropriate figure legends. Data comparisons should only be made from comparative experiments, and individual data should not be utilized across multiple figures. If inappropriate image/data manipulation is identified after publication, we reserve the right to ask for the original data and, if that is not satisfactory, to issue a correction or retract the paper, as appropriate.

  • Whioce Publishing will preserve e-journals with Portico, ensuring that they will be secure and available into the future.

  • Authors contributing to Whioce Publishing Pte. Ltd. agree to publish their articles under the Creative Commons Attribution-Noncommercial 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit, that the work is not used for commercial purposes, and that in the event of reuse or distribution, the terms of this license are made clear.
  • The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Article Processing Charges (APC)

Journal of Secure Communication and System is an Open Access Journal under Whioce Publishing. All articles published in Journal of Secure Communication and System are accessible electronically from the journal website without commencing any kind of payment. In order to ensure contents are freely available and maintain publishing quality, Article Process Charges (APC) is applicable to all authors who wish to submit their articles to the journal to cover the cost incurred in processing the manuscripts. Such cost will cover the peer-review, copyediting, typesetting, publishing, content depositing and archiving processes. Those charges are applicable only to authors who have their manuscript successfully accepted after peer-review.

Journal TitleAPC
Journal of Secure Communication and System$800

We encourage authors to publish their papers with us and don’t wish the cost of article processing fees to be a barrier especially to authors from the low and lower middle income countries/regions. A range of discounts or waivers are offered to authors who are unable to pay our publication processing fees. Authors can write in to apply for a waiver and requests will be considered on a case-by-case basis.

Authors based in these countries/regions listed below may apply to receive up to a 50%-100% waiver of the standard article processing fee; Waiver subjected to approval.

  • Afghanistan
  • Armenia
  • Bangladesh
  • Benin
  • Bhutan
  • Bolivia
  • Burkina Faso
  • Burundi
  • Cabo Verde
  • Cambodia
  • Cameroon
  • Central African Republic
  • Chad
  • Comoros
  • Congo, Dem. Rep
  • Congo, Rep.
  • Côte d'Ivoire
  • Djibouti
  • Egypt, Arab Rep.
  • El Salvador
  • Eritrea
  • Ethiopia
  • Gambia, The
  • Ghana
  • Guatemala
  • Guinea
  • Guinea-Bissau
  • Haiti
  • Honduras
  • India
  • Indonesia
  • Kenya
  • Kiribati
  • Korea, Dem. People's Rep.
  • Kosovo
  • Kyrgyz Republic
  • Lao PDR
  • Lesotho
  • Liberia
  • Madagascar
  • Malawi
  • Mali
  • Mauritania
  • Micronesia, Fed. Sts.
  • Moldova
  • Mongolia
  • Morocco
  • Mozambique
  • Myanmar
  • Nepal
  • Nicaragua
  • Niger
  • Nigeria
  • Pakistan
  • Papua New Guinea
  • Philippines
  • Rwanda
  • Samoa
  • São Tomé and Principe
  • Senegal
  • Sierra Leone
  • Solomon Islands
  • Somalia
  • South Sudan
  • Sri Lanka
  • Sudan
  • Swaziland
  • Syrian Arab Republic
  • Tajikistan
  • Tanzania
  • Timor-Leste
  • Togo
  • Tonga
  • Tunisia
  • Uganda
  • Ukraine
  • Uzbekistan
  • Vanuatu
  • Vietnam
  • West Bank and Gaza
  • Yemen, Rep.
  • Zambia
  • Zimbabwe

If you are residing in one of the above mentioned countries and need to apply for a waiver, please email our editorial department ( with the following information:

  • Your name and institution with full address details
  • Title of journal you wish to submit a manuscript to
  • Reason for applying for a waiver
  • Title of your paper
  • Country of residence of all co-author

APC Payment

Payments for APC of this journal can be made through our online PayPal payment gateway. Enter the article no. into the below textbox and select "Pay Now" to proceed with payment.

Article No.

*Article No. is mandatory for payment and it can be found on the acceptance letter issued by the Editorial Office. Payment without indicating Article No. will result in processing problem and delay in article processing. Please note that payments will be processed in USD. You can make payment through Masters, Visa or UnionPay card.

Frequently Asked Questions

  • Answer: To establish whether your paper is suitable for this journal, please read Focus and Scope under Editorial Policies.
  • Answer: Registration and login are required to submit manuscript online and to check the status of current submission.
  • Answer: The submission file can be submitted in OpenOffice, Microsoft Word, RTF, or WordPerfect document file format.
  • Answer: The length of the manuscript cannot be more than 8000 words.
  • Answer: The cover letter is necessary for each submission. The cover letter should be uploaded as a separate file in Step 4 during the submission. The contents of the cover letter should include brief explanation of what was previously known, the conceptual advancement with the findings and its significance to broad readership. The cover letter will only be visible to the editor. Reviewers will not have access to the cover letter.
  • Answer: You can suggest 2 reviewers for your submission. However, the decision of whether to invite them lies with the Editor.
  • Answer: This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge. Refer to the Publication Fees tab for more details.





Whioce Publishing Pte Ltd  and the Editor-in-chief invite all authors  to submit their  manuscripts to  our  newly launched  journal, Journal of Secure Communication and System, for peer review.

Posted: 2017-06-08
More Announcements...