IET Information Security
Published by John Wiley & Sons
ISSN : 1751-8709 eISSN : 1751-8717
Abbreviation : IET Inf. Secur.
Aims & Scope
The scope of this journal includes: • Access Control and Database Security • Ad-Hoc Network Aspects • Anonymity and E-Voting • Authentication • Block Ciphers and Hash Functions • Blockchain, Bitcoin (Technical aspects only) • Broadcast Encryption and Traitor Tracing • Combinatorial Aspects • Covert Channels and Information Flow • Critical Infrastructures • Cryptanalysis • Dependability • Digital Banking • Digital Currencies • Digital Rights Management • Digital Signature Schemes • Digital Steganography • Economic Aspects of Information Security • Elliptic Curve Cryptography and Number Theory • Embedded Systems Aspects • Embedded Systems Security and Forensics • Financial Cryptography • Firewall Security • Formal Methods and Security Verification • Human Aspects • Information Warfare and Survivability • Intrusion Detection • Java and XML Security • Key Distribution • Key Management • Malware • Multi-Party Computation and Threshold Cryptography • Peer-to-peer Security • PKIs • Public-Key and Hybrid Encryption • Quantum Cryptography • Risks of using Computers • Robust Networks • Secret Sharing • Secure Electronic Commerce • Software Obfuscation • Stream Ciphers • Trust Models • Watermarking and Fingerprinting
View Aims & ScopeMetrics & Ranking
Impact Factor
Year | Value |
---|---|
2025 | 2.6 |
2024 | 1.30 |
SJR (SCImago Journal Rank)
Year | Value |
---|---|
2024 | 0.449 |
Quartile
Year | Value |
---|---|
2024 | Q2 |
h-index
Year | Value |
---|---|
2024 | 44 |
Journal Rank
Year | Value |
---|---|
2024 | 12661 |
Journal Citation Indicator
Year | Value |
---|---|
2024 | 322 |
Impact Factor Trend
Abstracting & Indexing
Journal is indexed in leading academic databases, ensuring global visibility and accessibility of our peer-reviewed research.
Subjects & Keywords
Journal’s research areas, covering key disciplines and specialized sub-topics in Computer Science, designed to support cutting-edge academic discovery.
Licensing & Copyright
This journal operates under an Open Access model. Articles are freely accessible to the public immediately upon publication. The content is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0), allowing users to share and adapt the work with proper attribution.
Copyright remains with the author(s), and no permission is required for non-commercial use, provided the original source is cited.
Policy Links
This section provides access to essential policy documents, guidelines, and resources related to the journal’s publication and submission processes.
- Aims scope
- Homepage
- Oa statement
- Author instructions
- License terms
- Review url
- Board url
- Copyright url
- Plagiarism url
- Preservation url
- Apc url
- License
Plagiarism Policy
This journal follows a plagiarism policy. All submitted manuscripts are screened using reliable plagiarism detection software to ensure originality and academic integrity. Authors are responsible for proper citation and acknowledgment of all sources, and any form of plagiarism, including self-plagiarism, will not be tolerated.
For more details, please refer to our official: Plagiarism Policy.
APC Details
The journal’s Article Processing Charge (APC) policies support open access publishing in Computer Science, ensuring accessibility and quality in research dissemination.
This journal requires an Article Processing Charge (APC) to support open access publishing, covering peer review, editing, and distribution. The current APC is 2,490.00 USD. Learn more.
Explore journals without APCs for alternative publishing options.
Most Cited Articles
The Most Cited Articles section features the journal's most impactful research, based on citation counts. These articles have been referenced frequently by other researchers, indicating their significant contribution to their respective fields.
-
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
Citation: 187
Authors: A.K.
-
One for all – all for one: unifying standard differential power analysis attacks
Citation: 141
Authors: S., E., F.-X.
-
Trust-based on-demand multipath routing in mobile <i>ad hoc</i> networks
Citation: 126
Authors: X., Z., P., R., H.
-
Light-weight trust-based routing protocol for mobile <i>ad hoc</i> networks
Citation: 104
Authors: N., R.
-
Overlap-free Karatsuba–Ofman polynomial multiplication algorithms
Citation: 61
Authors: H., J., M., K.-Y.
-
Strengthening hardware AES implementations against fault attacks
Citation: 61
Authors: M., P., J.-B.