The scope of this journal includes: • Access Control and Database Security • Ad-Hoc Network Aspects • Anonymity and E-Voting • Authentication • Block Ciphers and Hash Functions • Blockchain, Bitcoin (Technical aspects only) • Broadcast Encryption and Traitor Tracing • Combinatorial Aspects • Covert Channels and Information Flow • Critical Infrastructures • Cryptanalysis • Dependability • Digital Banking • Digital Currencies • Digital Rights Management • Digital Signature Schemes • Digital Steganography • Economic Aspects of Information Security • Elliptic Curve Cryptography and Number Theory • Embedded Systems Aspects • Embedded Systems Security and Forensics • Financial Cryptography • Firewall Security • Formal Methods and Security Verification • Human Aspects • Information Warfare and Survivability • Intrusion Detection • Java and XML Security • Key Distribution • Key Management • Malware • Multi-Party Computation and Threshold Cryptography • Peer-to-peer Security • PKIs • Public-Key and Hybrid Encryption • Quantum Cryptography • Risks of using Computers • Robust Networks • Secret Sharing • Secure Electronic Commerce • Software Obfuscation • Stream Ciphers • Trust Models • Watermarking and Fingerprinting
YEAR | Impact Factor |
---|---|
2023-24 | 1.3 |
2022 | 1.4 |
2021 | 1.3 |
IET Information Security, 1751-8709, 2007-ongoing, Computer Science.