Journal Information
International Journal of Information Security
https://link.springer.com/journal/10207
Impact Factor:
2.400
Publisher:
Springer
ISSN:
1615-5262
Viewed:
12821
Tracked:
4
Call For Papers
Aims and scope

The International Journal of Information Security is an English language international journal on research in information security.

Information security builds on computer security and applied cryptography, but also reaches out to other branches of the information sciences. Information security is an important aspect of protecting the information society from a wide variety of threats.

The number and the sizes of international conferences treating information security grow with each passing year, as does the quantity of significant publishable technical work in this area. But much of this work appears too long after the need for it has arisen, if at all, or in journals with specialist readerships not including many of those to whom it would be most valuable. Moreover, we do not have journals covering applications and the implementation of security techniques, topics which are important in industry and the business world.

In this new century, The International Journal of Information Security will provide prompt publication of important technical work in information security, whether theoretical, applicable, or related to implementation.

The intended audience includes any person, whether active in the technology or not, whose interests in communications, commerce, banking, medicine, or other areas of endeavor are affected by information security.

The intended author is a technical specialist with the skill and commitment to presenting recent advances in information security to a broad audience around the world.

The intended review process will be peer review by members of the editorial board, with recourse to outside experts where appropriate.

The scope of the International Journal of Information Security (IJIS) is theory, applications, and implementations of information security. This includes, but is not limited to:

- system security - intrusion detection, secure end systems, secure operating systems, data base security, security infrastructures, security evaluation
- network security - Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures
- content protection - software protection, tamper resistant software
- applications - electronic commerce, electronic government, health, telecommunications, mobility
- foundations - privacy, access control, authentication, identification, applied cryptography, formal methods in information security

Co-founders
G.R. Blakley, College Station, TX, USA
G. Davida, Milwaukee, WI, USA
E. Dawson, Brisbane, Australia
D. Gollmann, Cambridge, UK
C.A. Meadows, Washington, DC, USA
E. Okamoto, Funabashi, Japan
Last updated by Dou Sun in 2024-07-20
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cbb1ICICSInternational Conference on Information and Communications Security2025-05-232025-07-212025-10-29
cb1FUSIONInternational Conference on Information Fusion2024-03-012024-05-012024-07-07
cINSCRYPTInternational Conference on Information Security and Cryptology2025-06-152025-08-012025-10-19
bICISCInternational Conference on Information Security and Cryptology2015-09-072015-10-192015-11-25
cIASInternational Conference on Information Assurance and Security 2015-10-212015-11-102015-12-07
bITWInformation Theory Workshop2013-07-122013-09-09
bb1ISITInternational Symposium on Information Theory2019-01-202019-03-312019-07-07
cISA'International Conference on Information Security and Assurance2016-01-302016-02-152016-03-24
bb3ICISSInternational Conference on Information Systems Security2025-08-102025-10-032025-12-16
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20