Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | International Journal of Information Security – incl. option to publish open access

We’re working on a new version of this journal site - preview it now
International Journal of Information Security

International Journal of Information Security

Editors-in-Chief: D. Gollmann; J. Lopez; M. Mambo

ISSN: 1615-5262 (print version)
ISSN: 1615-5270 (electronic version)

Journal no. 10207

80,33 € Personal Rate e-only
Get Subscription

Online subscription, valid from January through December of current calendar year

Immediate access to this year's issues via SpringerLink

1 Volume(-s) with 6 issue(-s) per annual subscription

Automatic annual renewal

More information: >> FAQs // >> Policy

  • Presents important technical work in information security, whether theoretical, applicable, or related to implementation  
  • Covers system security, network security, content protection, applications  
  • Contents include privacy, access control, authentication, identification, applied cryptography, and formal methods in information security

The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation.

Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility; and foundations: privacy, access control, authentication, identification, applied cryptography, and formal methods in information security.

Related subjects » Communication Networks - Security and Cryptology - Signals & Communication - Software Engineering - Theoretical Computer Science

Impact Factor: 1.822 (2018) * 

Journal Citation Reports®

Abstracted/Indexed in 

Science Citation Index Expanded (SciSearch), Journal Citation Reports/Science Edition, SCOPUS, INSPEC, Google Scholar, ACM Digital Library, Criminal Justice Periodical Index, Current Contents/Engineering, Computing and Technology, DBLP, EBSCO Academic Search, EBSCO Advanced Placement Source, EBSCO Applied Science & Technology Source, EBSCO Business Continuity & Disaster Recovery Reference Center , EBSCO Business Source, EBSCO Computer Science Index, EBSCO Computer Source: Consumer Edition, EBSCO Computers & Applied Sciences Complete, EBSCO Criminal Justice Abstracts, EBSCO Discovery Service, EBSCO Engineering Source, EBSCO International Security & Counter-Terrorism Reference Center, EBSCO Risk Management Reference Center, EBSCO Science & Technology Collection, EBSCO STM Source, EBSCO TOC Premier, EI Compendex, Gale, Gale Academic OneFile, Institute of Scientific and Technical Information of China, Japanese Science and Technology Agency (JST), Naver, OCLC WorldCat Discovery Service, ProQuest ABI/INFORM, ProQuest Advanced Technologies & Aerospace Database, ProQuest Business Premium Collection, ProQuest Central, ProQuest Computer and Information Systems Abstracts, ProQuest Computer Science, ProQuest Military Database, ProQuest Pharma Collection, ProQuest SciTech Premium Collection, ProQuest Social Science Collection, ProQuest Technology Collection, ProQuest-ExLibris Primo, ProQuest-ExLibris Summon, WTI Frankfurt eG

Read this Journal on Springerlink

For authors and editors

  • Journal Citation Reports®
    2018 Impact Factor
  • 1.822
  • Aims and Scope

    Aims and Scope


    The International Journal of Information Security is an English language international journal on research in information security.

    Information security builds on computer security and applied cryptography, but also reaches out to other branches of the information sciences. Information security is an important aspect of protecting the information society from a wide variety of threats.

    The number and the sizes of international conferences treating information security grow with each passing year, as does the quantity of significant publishable technical work in this area. But much of this work appears too long after the need for it has arisen, if at all, or in journals with specialist readerships not including many of those to whom it would be most valuable. Moreover, we do not have journals covering applications and the implementation of security techniques, topics which are important in industry and the business world.

    In this new century, The International Journal of Information Security will provide prompt publication of important technical work in information security, whether theoretical, applicable, or related to implementation.

    The intended audience includes any person, whether active in the technology or not, whose interests in communications, commerce, banking, medicine, or other areas of endeavor are affected by information security.

    The intended author is a technical specialist with the skill and commitment to presenting recent advances in information security to a broad audience around the world.

    The intended review process will be peer review by members of the editorial board, with recourse to outside experts where appropriate.

    The scope of the International Journal of Information Security (IJIS) is theory, applications, and implementations of information security. This includes, but is not limited to:

    - system security - intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation
    - network security - Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures
    - content protection - software protection, tamper resistant software
    - applications - electronic commerce, electronic government, health, telecommunications, mobility
    - foundations - privacy, access control, authentication, identification, applied cryptography, formal methods in information security

    G.R. Blakley, College Station, TX, USA
    G. Davida, Milwaukee, WI, USA
    E. Dawson, Brisbane, Australia
    D. Gollmann, Cambridge, UK
    C.A. Meadows, Washington, DC, USA
    E. Okamoto, Funabashi, Japan

  • Submit Online
  • Open Choice - Your Way to Open Access
  • Instructions for Authors

    Instructions for Authors


  • Author Academy: Training for Authors
  • English Language Editing

    English Language Editing


  • CfP: IoT Security and Privacy (pdf, 24 k...
  • CfP: Security and Privacy of Blockchain ...
  • Copyright Information

    Copyright Information


    Copyright Information

    For Authors

    Submission of a manuscript implies: that the work described has not been published before (except in form of an abstract or as part of a published lecture, review or thesis); that it is not under consideration for publication elsewhere; that its publication has been approved by all co-authors, if any, as well as – tacitly or explicitly – by the responsible authorities at the institution where the work was carried out.

    Author warrants (i) that he/she is the sole owner or has been authorized by any additional copyright owner to assign the right, (ii) that the article does not infringe any third party rights and no license from or payments to a third party is required to publish the article and (iii) that the article has not been previously published or licensed. The author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. Transfer of copyright to Springer (respectively to owner if other than Springer) becomes effective if and when a Copyright Transfer Statement is signed or transferred electronically by the corresponding author. After submission of the Copyright Transfer Statement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted by Springer.

    The copyright to this article, including any graphic elements therein (e.g. illustrations, charts, moving images), is assigned for good and valuable consideration to Springer effective if and when the article is accepted for publication and to the extent assignable if assignability is restricted for by applicable law or regulations (e.g. for U.S. government or crown employees).

    The copyright assignment includes without limitation the exclusive, assignable and sublicensable right, unlimited in time and territory, to reproduce, publish, distribute, transmit, make available and store the article, including abstracts thereof, in all forms of media of expression now known or developed in the future, including pre- and reprints, translations, photographic reproductions and microform. Springer may use the article in whole or in part in electronic form, such as use in databases or data networks for display, print or download to stationary or portable devices. This includes interactive and multimedia use and the right to alter the article to the extent necessary for such use.

    Authors may self-archive the Author's accepted manuscript of their articles on their own websites. Authors may also deposit this version of the article in any repository, provided it is only made publicly available 12 months after official publication or later. He/she may not use the publisher's version (the final article), which is posted on SpringerLink and other Springer websites, for the purpose of self-archiving or deposit. Furthermore, the Author may only post his/her version provided acknowledgement is given to the original source of publication and a link is inserted to the published article on Springer's website. The link must be accompanied by the following text: "The final publication is available at link.springer.com".

    Prior versions of the article published on non-commercial pre-print servers like arXiv.org can remain on these servers and/or can be updated with Author's accepted version. The final published version (in pdf or html/xml format) cannot be used for this purpose. Acknowledgement needs to be given to the final publication and a link must be inserted to the published article on Springer's website, accompanied by the text "The final publication is available at link.springer.com". Author retains the right to use his/her article for his/her further scientific career by including the final published journal article in other publications such as dissertations and postdoctoral qualifications provided acknowledgement is given to the original source of publication.

    Author is requested to use the appropriate DOI for the article. Articles disseminated via link.springer.com are indexed, abstracted and referenced by many abstracting and information services, bibliographic networks, subscription agencies, library networks, and consortia.

    For Readers

    While the advice and information in this journal is believed to be true and accurate at the date of its publication, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may have been made. The publisher makes no warranty, express or implied, with respect to the material contained herein.

    All articles published in this journal are protected by copyright, which covers the exclusive rights to reproduce and distribute the article (e.g., as offprints), as well as all translation rights. No material published in this journal may be reproduced photographically or stored on microfilm, in electronic data bases, video disks, etc., without first obtaining written permission from the publisher (respectively the copyright owner if other than Springer). The use of general descriptive names, trade names, trademarks, etc., in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.

    Springer has partnered with Copyright Clearance Center's RightsLink service to offer a variety of options for reusing Springer content. For permission to reuse our content please locate the material that you wish to use on link.springer.com or on springerimages.com and click on the permissions link or go to copyright.com, then enter the title of the publication that you wish to use. For assistance in placing a permission request, Copyright Clearance Center can be connected directly via phone: +1-855-239-3415, fax: +1-978-646-8600, or e-mail: info@copyright.com.

    © Springer-Verlag Berlin Heidelberg

Alerts for this journal


Get the table of contents of every new issue published in International Journal of Information Security.