Default: Journal of Computer Security

ISSN: 0926-227X

Journal Home

Journal Guideline

Journal of Computer Security Q3 Unclaimed

IOS Press BV Netherlands
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

Journal of Computer Security is a journal indexed in SJR in Software and Computer Networks and Communications with an H index of 59. It has an SJR impact factor of 0,34 and it has a best quartile of Q3. It is published in English. It has an SJR impact factor of 0,34.

Type: Journal

Type of Copyright:

Languages: English

Open Access Policy:

Type of publications:

Publication frecuency: -

Metrics

Journal of Computer Security

0,34

SJR Impact factor

59

H Index

25

Total Docs (Last Year)

67

Total Docs (3 years)

1093

Total Refs

68

Total Cites (3 years)

64

Citable Docs (3 years)

0.98

Cites/Doc (2 years)

43.72

Ref/Doc

Comments

No comments ... Be the first to comment!



Best articles by citations

Some attacks upon authenticated group key agreement protocols

View more

On the information leakage of differentially-private mechanisms

View more

RIF: Reactive information flow labels

View more

Field switching in BGV-style homomorphic encryption

View more

Adjoining classified and unclassified information by abstract interpretation

View more

Efficient integrity checks for join queries in the cloud1

View more

Event-driven RBAC

View more

Formal security analysis of PKCS#11 and proprietary extensions

View more

A framework for analyzing RFID distance bounding protocols

View more

Dynamic types for authentication*

View more

The impact of application context on privacy and performance of keystroke authentication systems

View more

Privacy implications of room climate data

View more
SHOW MORE ARTICLES

CA trust management for the Web PKI

View more

Security analysis for temporal role based access control

View more

Using sample size to limit exposure to data mining

View more

Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer

View more

Sharing-habits based privacy control in social networks

View more

A study on a feasible no-root approach on Android

View more

Automated reasoning for equivalences in the applied pi calculus with barriers

View more

Towards a definitive paradigm for security in object-oriented systems and applications

View more

Privacy policy enforcement in enterprises with identity management solutions

View more

A survey of algebraic properties used in cryptographic protocols

View more

Characterizing a property-driven obfuscation strategy

View more

A logical framework for history-based access control and reputation systems

View more

FAQS