IET Information Security publishes original research papers covering a wide range of topics in Information Security and Cryptography, including:
Impact and Significance
IET Information Security plays a crucial role in advancing research and development in Information Security and Cryptography:
Cutting-Edge Research: Publishes innovative research contributions advancing the state-of-the-art in security technologies.
Broad Application Areas: Covers diverse application areas such as finance, healthcare, telecommunications, and government.
Interdisciplinary Approach: Bridges theoretical insights with practical applications in cybersecurity.
Global Reach: Provides a platform for international collaboration and knowledge exchange among researchers and practitioners.
Emerging Technologies: Addresses emerging challenges and opportunities posed by new technologies and threats.
Types of Articles Accepted
IET Information Security welcomes various types of contributions, including:
Research Papers: Original research articles presenting new findings and methodologies.
Review Articles: Comprehensive reviews of the state-of-the-art in specific areas of Information Security.
Case Studies: Detailed studies showcasing applications of security technologies in real-world scenarios.
Technical Notes: Short communications on emerging research or preliminary findings.
Survey Articles: In-depth surveys on current trends and developments in Information Security and Cryptography.
Journal Home:  Journal Homepage
Editor-in-Chief:  Yvo Desmedt
scope:
IET Information Security publishes original research papers covering topics in Information Security and Cryptography, Access Control and Database Security, Ad-Hoc Network Aspects, Anonymity and E-Voting, Authentication, Biometrics, Block Ciphers and Hash Functions, Broadcast Encryption and Traitor Tracing, Combinatorial Aspects, Covert Channels and Information Flow, Critical Infrastructures, and Cryptanalysis.
The scope of the journal includes:
Access Control and Database Security: Techniques and methodologies for securing access to databases and sensitive information.
Ad-Hoc Network Aspects: Security challenges and solutions specific to ad-hoc networks.
Anonymity and E-Voting: Methods and protocols ensuring anonymity in electronic voting systems.
Authentication: Techniques for verifying the identity of users or entities accessing systems or data.
Block Ciphers and Hash Functions: Development and analysis of cryptographic algorithms for data encryption and integrity.
Blockchain, Bitcoin (Technical aspects only): Technical aspects and security considerations related to blockchain technology and cryptocurrencies like Bitcoin.
Broadcast Encryption and Traitor Tracing: Methods for securely distributing information to multiple recipients and tracing unauthorized disclosures.
Combinatorial Aspects: Theoretical and practical aspects of combinatorial methods in information security.
Covert Channels and Information Flow: Detection and prevention of covert communication channels and unauthorized information flow.
Critical Infrastructures: Security challenges and solutions for protecting critical infrastructures from cyber threats.
Cryptanalysis: Techniques for analyzing and breaking cryptographic schemes and protocols.
Print ISSN:  17518709
Electronic ISSN:  
Abstracting and Indexing:  Science Citation Index Expanded, Scopus.
Imapct Factor 2023:  1.3
Subject Area and Category:   Computer Science, Computer Networks and Communications, Information Systems, Software
Publication Frequency:  Quarterly
H Index:  42
Q1:  
Q2:  Computer Networks and Communications
Q3:  
Q4:  
Cite Score:  3.8
SNIP:  0.654
Journal Rank(SJR):  0.48
Latest Articles:   Latest Articles in IET Information Security
Guidelines for Authors: IET Information Security Author Guidelines
Paper Submissions: Paper Submissions in IET Information Security
Publisher:  Wiley-Blackwell
Country:  United Kingdom