ISSN: 2214-2126
Journal Home
Journal Guideline
Journal of Information Security and Applications Q1 Unclaimed
Journal of Information Security and Applications is a journal indexed in SJR in Software and Computer Networks and Communications with an H index of 54. It has an SJR impact factor of 1,279 and it has a best quartile of Q1. It has an SJR impact factor of 1,279.
Type: Journal
Type of Copyright:
Languages:
Open Access Policy:
Type of publications:
Publication frecuency: -
- €
Inmediate OANPD
Embargoed OA- €
Non OAMetrics
1,279
SJR Impact factor54
H Index214
Total Docs (Last Year)539
Total Docs (3 years)10001
Total Refs3721
Total Cites (3 years)535
Citable Docs (3 years)6.97
Cites/Doc (2 years)46.73
Ref/DocOther journals with similar parameters
IEEE Transactions on Evolutionary Computation Q1
IEEE Transactions on Cybernetics Q1
Synthesis Lectures on Communication Networks Q1
Information Fusion Q1
IEEE Transactions on Pattern Analysis and Machine Intelligence Q1
Compare this journals
Aims and Scope
Best articles by citations
Concepts and languages for privacy-preserving attribute-based authentication
View moreAn Enhanced and Secured RSA Key Generation Scheme (ESRKGS)
View moreKernel homomorphic encryption protocol
View moreEnhanced AMBTC based data hiding method using hamming distance and pixel value differencing
View moreImplementation and practical problems of chaos-based cryptography revisited
View moreASH-512: Design and implementation of cryptographic hash algorithm using co-ordinate geometry concepts
View moreAn investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments
View moreChallenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis
View moreGeometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features
View morePractical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation
View moreBlock image encryption based on modified playfair and chaotic system
View moreESEAP: ECC based secure and efficient mutual authentication protocol using smart card
View moreImprovement of (n, n)-multi-secret image sharing schemes based on Boolean operations
View moreA research of security in website account binding
View moreOne-sided leakage-resilient privacy only two-message oblivious transfer
View moreA magic cube based information hiding scheme of large payload
View moreMitigating cyberattack related domino effects in process plants via ICS segmentation
View moreSignalling over-privileged mobile applications using passive security indicators
View moreGenerating pseudo-random numbers by combining two systems with complex behaviors
View moreIntegrating information quality dimensions into information security risk management (ISRM)
View morePublic key encryption with conjunctive keyword search on lattice
View moreLightweight reputation-based approach against simple and cooperative black-hole attacks for MANET
View moreA privacy preserving biometric-based three-factor remote user authenticated key agreement scheme
View moreA greater understanding of social networks privacy requirements: The user perspective
View more
Comments