ISSN: 0926-227X
Journal Home
Journal Guideline
Journal of Computer Security Q3 Unclaimed
Journal of Computer Security is a journal indexed in SJR in Software and Computer Networks and Communications with an H index of 59. It has an SJR impact factor of 0,306 and it has a best quartile of Q3. It is published in English. It has an SJR impact factor of 0,306.
Type: Journal
Type of Copyright:
Languages: English
Open Access Policy:
Type of publications:
Publication frecuency: -


- €
Inmediate OANPD
Embargoed OA- €
Non OAMetrics
0,306
SJR Impact factor59
H Index14
Total Docs (Last Year)76
Total Docs (3 years)731
Total Refs110
Total Cites (3 years)71
Citable Docs (3 years)1.25
Cites/Doc (2 years)52.21
Ref/DocOther journals with similar parameters
SoftwareX Q3
Formal Aspects of Computing Q3
Journal of Ambient Intelligence and Smart Environments Q3
Journal of Computer Science and Technology Q3
Science of Computer Programming Q3
Compare this journals
Aims and Scope
Best articles by citations
Some attacks upon authenticated group key agreement protocols
View moreOn the information leakage of differentially-private mechanisms
View moreRIF: Reactive information flow labels
View moreField switching in BGV-style homomorphic encryption
View moreAdjoining classified and unclassified information by abstract interpretation
View moreEfficient integrity checks for join queries in the cloud1
View moreEvent-driven RBAC
View moreFormal security analysis of PKCS#11 and proprietary extensions
View moreA framework for analyzing RFID distance bounding protocols
View moreDynamic types for authentication*
View moreThe impact of application context on privacy and performance of keystroke authentication systems
View morePrivacy implications of room climate data
View moreCA trust management for the Web PKI
View moreSecurity analysis for temporal role based access control
View moreUsing sample size to limit exposure to data mining
View moreFormal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer
View moreSharing-habits based privacy control in social networks
View moreA study on a feasible no-root approach on Android
View moreAutomated reasoning for equivalences in the applied pi calculus with barriers
View moreTowards a definitive paradigm for security in object-oriented systems and applications
View morePrivacy policy enforcement in enterprises with identity management solutions
View moreA survey of algebraic properties used in cryptographic protocols
View moreCharacterizing a property-driven obfuscation strategy
View moreA logical framework for history-based access control and reputation systems
View more
Comments