International Journal of Information Security

ISSN: 1615-5262

Journal Home

Journal Guideline

International Journal of Information Security Q1 Unclaimed

Springer Verlag Germany
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation. Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility; and foundations: privacy, access control, authentication, identification, applied cryptography, and formal methods in information security. Presents important technical work in information security, whether theoretical, applicable, or related to implementation   Covers system security, network security, content protection, applications   Contents include privacy, access control, authentication, identification, applied cryptography, and formal methods in information security The average time to first decision in 2019 was 53 days (corresponds to all submissions, including those that receive a first decision without entering the review cycle, therefore the response time for individual submissions varies) It has an SJR impact factor of 0,878.

Type: Journal

Type of Copyright:

Languages: English

Open Access Policy: Open Choice

Type of publications:

Publication frecuency: -

Metrics

International Journal of Information Security

0,878

SJR Impact factor

51

H Index

142

Total Docs (Last Year)

170

Total Docs (3 years)

8855

Total Refs

735

Total Cites (3 years)

168

Citable Docs (3 years)

3.81

Cites/Doc (2 years)

62.36

Ref/Doc

Comments

No comments ... Be the first to comment!



Best articles by citations

Preface to the special issue on PKI

View more

Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs

View more

A practical privacy-preserving targeted advertising scheme for IPTV users

View more

A coding approach to the multicast stream authentication problem

View more

A modified exhaustive search on a password system using SHA-1

View more

Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture

View more

Bayesian rational exchange

View more

Certificate revocation system implementation based on the Merkle hash tree

View more

Watermarking protocols: an excursus to motivate a new approach

View more

A symbolic framework for multi-faceted security protocol analysis

View more

Enhanced Tacit Secrets: System-assigned passwords you can't write down, but don't need to

View more

Keeping secrets in incomplete databases

View more
SHOW MORE ARTICLES

CRUST: cryptographic remote untrusted storage without public keys

View more

RPCAE: a novel revocable proxy convertible authenticated encryption scheme

View more

A log mining approach for process monitoring in SCADA

View more

Preface

View more

Key substitution attacks revisited: Taking into account malicious signers

View more

SilentKnock: practical, provably undetectable authentication

View more

Leveraging cyber threat intelligence for a dynamic risk framework

View more

Public Key Infrastructure: Research and Applications

View more

A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study

View more

Formal validation of automated policy refinement in the management of network security systems

View more

Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR

View more

Estimating the maximum information leakage

View more

FAQS