International Journal of Information Security Q1 Unclaimed
The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation. Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility; and foundations: privacy, access control, authentication, identification, applied cryptography, and formal methods in information security. Presents important technical work in information security, whether theoretical, applicable, or related to implementation Covers system security, network security, content protection, applications Contents include privacy, access control, authentication, identification, applied cryptography, and formal methods in information security The average time to first decision in 2019 was 53 days (corresponds to all submissions, including those that receive a first decision without entering the review cycle, therefore the response time for individual submissions varies) It has an SJR impact factor of 0,878.
Type: Journal
Type of Copyright:
Languages: English
Open Access Policy: Open Choice
Type of publications:
Publication frecuency: -


2390 €
Inmediate OANPD
Embargoed OA0 €
Non OAMetrics
0,878
SJR Impact factor51
H Index142
Total Docs (Last Year)170
Total Docs (3 years)8855
Total Refs735
Total Cites (3 years)168
Citable Docs (3 years)3.81
Cites/Doc (2 years)62.36
Ref/DocOther journals with similar parameters
International Journal of Computer Vision Q1
IEEE Transactions on Pattern Analysis and Machine Intelligence Q1
Information Fusion Q1
IEEE Transactions on Cybernetics Q1
IEEE Transactions on Evolutionary Computation Q1
Compare this journals
Aims and Scope
Best articles by citations
Preface to the special issue on PKI
View moreFlow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
View moreA practical privacy-preserving targeted advertising scheme for IPTV users
View moreA coding approach to the multicast stream authentication problem
View moreA modified exhaustive search on a password system using SHA-1
View moreMobile Web services authentication using SAML and 3GPP generic bootstrapping architecture
View moreBayesian rational exchange
View moreCertificate revocation system implementation based on the Merkle hash tree
View moreWatermarking protocols: an excursus to motivate a new approach
View moreA symbolic framework for multi-faceted security protocol analysis
View moreEnhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to
View moreKeeping secrets in incomplete databases
View moreCRUST: cryptographic remote untrusted storage without public keys
View moreRPCAE: a novel revocable proxy convertible authenticated encryption scheme
View moreA log mining approach for process monitoring in SCADA
View morePreface
View moreKey substitution attacks revisited: Taking into account malicious signers
View moreSilentKnock: practical, provably undetectable authentication
View moreLeveraging cyber threat intelligence for a dynamic risk framework
View morePublic Key Infrastructure: Research and Applications
View moreA Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study
View moreFormal validation of automated policy refinement in the management of network security systems
View moreLimits of the BRSIM/UC soundness of Dolev-Yao-style XOR
View moreEstimating the maximum information leakage
View more
Comments