ISSN: 0926-227X
Journal Home
Journal Guideline
Journal of Computer Security Q3 Unclaimed
Journal of Computer Security is a journal indexed in SJR in Software and Computer Networks and Communications with an H index of 59. It has an SJR impact factor of 0,34 and it has a best quartile of Q3. It is published in English. It has an SJR impact factor of 0,34.
Type: Journal
Type of Copyright:
Languages: English
Open Access Policy:
Type of publications:
Publication frecuency: -


- €
Inmediate OANPD
Embargoed OA- €
Non OAMetrics
0,34
SJR Impact factor59
H Index25
Total Docs (Last Year)67
Total Docs (3 years)1093
Total Refs68
Total Cites (3 years)64
Citable Docs (3 years)0.98
Cites/Doc (2 years)43.72
Ref/DocOther journals with similar parameters
Formal Aspects of Computing Q3
Journal of Experimental and Theoretical Artificial Intelligence Q3
Journal of Functional Programming Q3
Journal of Intelligent Systems Q3
International Journal of Innovative Computing, Information and Control Q3
Compare this journals
Aims and Scope
Best articles by citations
Some attacks upon authenticated group key agreement protocols
View moreOn the information leakage of differentially-private mechanisms
View moreRIF: Reactive information flow labels
View moreField switching in BGV-style homomorphic encryption
View moreAdjoining classified and unclassified information by abstract interpretation
View moreEfficient integrity checks for join queries in the cloud1
View moreEvent-driven RBAC
View moreFormal security analysis of PKCS#11 and proprietary extensions
View moreA framework for analyzing RFID distance bounding protocols
View moreDynamic types for authentication*
View moreThe impact of application context on privacy and performance of keystroke authentication systems
View morePrivacy implications of room climate data
View moreCA trust management for the Web PKI
View moreSecurity analysis for temporal role based access control
View moreUsing sample size to limit exposure to data mining
View moreFormal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer
View moreSharing-habits based privacy control in social networks
View moreA study on a feasible no-root approach on Android
View moreAutomated reasoning for equivalences in the applied pi calculus with barriers
View moreTowards a definitive paradigm for security in object-oriented systems and applications
View morePrivacy policy enforcement in enterprises with identity management solutions
View moreA survey of algebraic properties used in cryptographic protocols
View moreCharacterizing a property-driven obfuscation strategy
View moreA logical framework for history-based access control and reputation systems
View more
Comments