Impact Factor
1.3
2023-24

ABOUT IET Information Security

The scope of this journal includes: • Access Control and Database Security • Ad-Hoc Network Aspects • Anonymity and E-Voting • Authentication • Block Ciphers and Hash Functions • Blockchain, Bitcoin (Technical aspects only) • Broadcast Encryption and Traitor Tracing • Combinatorial Aspects • Covert Channels and Information Flow • Critical Infrastructures • Cryptanalysis • Dependability • Digital Banking • Digital Currencies • Digital Rights Management • Digital Signature Schemes • Digital Steganography • Economic Aspects of Information Security • Elliptic Curve Cryptography and Number Theory • Embedded Systems Aspects • Embedded Systems Security and Forensics • Financial Cryptography • Firewall Security • Formal Methods and Security Verification • Human Aspects • Information Warfare and Survivability • Intrusion Detection • Java and XML Security • Key Distribution • Key Management • Malware • Multi-Party Computation and Threshold Cryptography • Peer-to-peer Security • PKIs • Public-Key and Hybrid Encryption • Quantum Cryptography • Risks of using Computers • Robust Networks • Secret Sharing • Secure Electronic Commerce • Software Obfuscation • Stream Ciphers • Trust Models • Watermarking and Fingerprinting

Legend

  • 1751-8709
  • Computer Science
  • 2007-ongoing
  • United Kingdom

METRICS

YEAR Impact Factor
2023-24 1.3
2022 1.4
2021 1.3

DETAILS

IET Information Security, 1751-8709, 2007-ongoing, Computer Science.

Directory Indexing of International Research Journals