Default: Journal of Information Security and Applications

ISSN: 2214-2126

Journal Home

Journal Guideline

Journal of Information Security and Applications Q1 Unclaimed

Elsevier Ltd. United Kingdom
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

Journal of Information Security and Applications is a journal indexed in SJR in Software and Computer Networks and Communications with an H index of 54. It has an SJR impact factor of 1,279 and it has a best quartile of Q1. It has an SJR impact factor of 1,279.

Type: Journal

Type of Copyright:

Languages:

Open Access Policy:

Type of publications:

Publication frecuency: -

Price

- €

Inmediate OA

NPD

Embargoed OA

- €

Non OA

Metrics

Journal of Information Security and Applications

1,279

SJR Impact factor

54

H Index

214

Total Docs (Last Year)

539

Total Docs (3 years)

10001

Total Refs

3721

Total Cites (3 years)

535

Citable Docs (3 years)

6.97

Cites/Doc (2 years)

46.73

Ref/Doc

Comments

No comments ... Be the first to comment!



Best articles by citations

Concepts and languages for privacy-preserving attribute-based authentication

View more

An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)

View more

Kernel homomorphic encryption protocol

View more

Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing

View more

Implementation and practical problems of chaos-based cryptography revisited

View more

ASH-512: Design and implementation of cryptographic hash algorithm using co-ordinate geometry concepts

View more

An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments

View more

Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysis

View more

Geometric transformation invariant block based copy-move forgery detection using fast and efficient hybrid local features

View more

Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation

View more

Block image encryption based on modified playfair and chaotic system

View more

ESEAP: ECC based secure and efficient mutual authentication protocol using smart card

View more
SHOW MORE ARTICLES

Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations

View more

A research of security in website account binding

View more

One-sided leakage-resilient privacy only two-message oblivious transfer

View more

A magic cube based information hiding scheme of large payload

View more

Mitigating cyberattack related domino effects in process plants via ICS segmentation

View more

Signalling over-privileged mobile applications using passive security indicators

View more

Generating pseudo-random numbers by combining two systems with complex behaviors

View more

Integrating information quality dimensions into information security risk management (ISRM)

View more

Public key encryption with conjunctive keyword search on lattice

View more

Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET

View more

A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme

View more

A greater understanding of social networks privacy requirements: The user perspective

View more

FAQS