ISSN: 1751-8709
Journal Home
Journal Guideline
IET Information Security Q2 Unclaimed
IET Information Security is a journal indexed in SJR in Software and Information Systems with an H index of 44. It has an SJR impact factor of 0,449 and it has a best quartile of Q2. It has an SJR impact factor of 0,449.
Type: Journal
Type of Copyright:
Languages:
Open Access Policy:
Type of publications:
Publication frecuency: -
- €
Inmediate OANPD
Embargoed OA- €
Non OAMetrics
0,449
SJR Impact factor44
H Index50
Total Docs (Last Year)137
Total Docs (3 years)1934
Total Refs322
Total Cites (3 years)133
Citable Docs (3 years)2.32
Cites/Doc (2 years)38.68
Ref/DocOther journals with similar parameters
Journal of Intelligent Information Systems Q2
Knowledge and Information Systems Q2
IACR Transactions on Symmetric Cryptology Q2
Journal of Cryptology Q2
Computer Speech and Language Q2
Compare this journals
Aims and Scope
Best articles by citations
Adaptively secure broadcast encryption under standard assumptions with better efficiency
View moreDetecting lateral spear phishing attacks in organisations
View moreDetecting LDoS attack bursts based on queue distribution
View moreSelf-adaptive approach for resource-aware security provisioning in wireless ad hoc networks
View moreCryptanalysis of the Dragonfly key exchange protocol
View moreNew second-order threshold implementation of AES
View moreEfficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience
View moreDetecting multiple H.264/AVC compressions with the same quantisation parameters
View moreComparing and debugging firewall rule tables
View moreAspectising honeytokens to contain the insider threat
View moreSecurity analysis of ABAC under an administrative model
View moreApproaching secure industrial control systems
View moreDifferential fault analysis on LED using Super-Sbox
View morePractical verifiably encrypted signature based on Waters signatures
View moreHigh-performance and high-speed implementation of polynomial basis Itoh-Tsujii inversion algorithm over GF(2 m )
View moreLightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks
View moreSecurity analysis of two certificateless short signature schemes
View morePrivacy of a randomised skip lists-based protocol
View moreMalware classification based on API calls and behaviour analysis
View moreDistributed key generation protocol with hierarchical threshold access structure
View moreRobust audio watermarking using frequency-selective spread spectrum
View moreThreshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem
View moreMalware detection method based on the control-flow construct feature of software
View moreAnalysis of bilinear pairing-based accumulator for identity escrowing
View more
Comments