Journal Information
International Journal of Information Security
https://link.springer.com/journal/10207
Impact Factor:
2.400
Publisher:
Springer
ISSN:
1615-5262
Viewed:
9295
Tracked:
4
Call For Papers
Aims and scope

The International Journal of Information Security is an English language international journal on research in information security.

Information security builds on computer security and applied cryptography, but also reaches out to other branches of the information sciences. Information security is an important aspect of protecting the information society from a wide variety of threats.

The number and the sizes of international conferences treating information security grow with each passing year, as does the quantity of significant publishable technical work in this area. But much of this work appears too long after the need for it has arisen, if at all, or in journals with specialist readerships not including many of those to whom it would be most valuable. Moreover, we do not have journals covering applications and the implementation of security techniques, topics which are important in industry and the business world.

In this new century, The International Journal of Information Security will provide prompt publication of important technical work in information security, whether theoretical, applicable, or related to implementation.

The intended audience includes any person, whether active in the technology or not, whose interests in communications, commerce, banking, medicine, or other areas of endeavor are affected by information security.

The intended author is a technical specialist with the skill and commitment to presenting recent advances in information security to a broad audience around the world.

The intended review process will be peer review by members of the editorial board, with recourse to outside experts where appropriate.

The scope of the International Journal of Information Security (IJIS) is theory, applications, and implementations of information security. This includes, but is not limited to:

- system security - intrusion detection, secure end systems, secure operating systems, data base security, security infrastructures, security evaluation
- network security - Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures
- content protection - software protection, tamper resistant software
- applications - electronic commerce, electronic government, health, telecommunications, mobility
- foundations - privacy, access control, authentication, identification, applied cryptography, formal methods in information security

Co-founders
G.R. Blakley, College Station, TX, USA
G. Davida, Milwaukee, WI, USA
E. Dawson, Brisbane, Australia
D. Gollmann, Cambridge, UK
C.A. Meadows, Washington, DC, USA
E. Okamoto, Funabashi, Japan
Last updated by Dou Sun in 2024-07-20
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cba1ICIPInternational Conference on Image Processing2025-01-222025-05-202025-09-14
WoTBDInternational Symposium on Web of Things and Big Data2015-08-302015-09-152015-10-06
MSE'International Conference on Materials Science and Engineering2023-04-292023-05-012023-05-13
ICRCCInternational Conference on Radar, Communication and Computing2016-09-152016-09-202016-08-13
CSENInternational Conference on Computer Science and Engineering2022-09-032022-09-102022-09-17
ccb1MMMInternational Conference on MultiMedia Modeling2024-08-192024-10-092025-01-07
ICT4AWEInternational Conference on Information and Communication Technologies for Ageing Well and e-Health2015-12-072016-02-012016-04-21
ICSIPInternational Conference on Signal and Image Processing2025-02-052025-03-052025-07-12
MulGraBInternational Conference on Multimedia, Computer Graphics and Broadcasting2015-06-302015-07-152015-11-25
SSPIEEE Statistical Signal Processing Workshop 2012-04-152012-08-05
Recommendation