Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | International Journal of Information Security – incl. option to publish open access (Editorial Board)

International Journal of Information Security

International Journal of Information Security

Editors-in-Chief: D. Gollmann; J. Lopez; M. Mambo

ISSN: 1615-5262 (print version)
ISSN: 1615-5270 (electronic version)

Journal no. 10207

80,33 € Personal Rate e-only
Get Subscription

Online subscription, valid from January through December of current calendar year

Immediate access to this year's issues via SpringerLink

1 Volume(-s) with 6 issue(-s) per annual subscription

Automatic annual renewal

More information: >> FAQs // >> Policy


Dieter Gollmann
TU Hamburg-Harburg, FB 4-14
21071 Hamburg, Germany

Javier Lopez (Managing Editor)
Computer Science Department
University of Malaga
29071 Malaga, Spain

Masahiro Mambo
Institute of Science and Engineering
Kanazawa University
Kanazawa, 920-1192, Japan

Editorial Board

Magnus Almgren, Chalmers University of Technology, Goteborg, Sweden
Elli Androulaki, IBM Research, Zurich, Switzerland
Elisa Bertino, Purdue University, West Lafayette, IN, USA
Joachim Biskup, TU Dortmund, Germany
Liqun Chen, Hewlett Packard Labs, Bristol, UK
Sherman S.M. Chow, Chinese University of Hong Kong, N.T., Hong Kong
Mauro Conti, University of Padua, Italy
Jorge Cuellar, Siemens AG, Munich, Germany
Frédéric Cuppens, Télécom Bretagne, Rennes, France
Roberto Di Pietro, Università di Roma Tre, Italy
Simone Fischer-Hübner, Karlstad University, Sweden
Sara Foresti, Università degli Studi di Milano, Italy
Joaquin Garcia-Alfaro, Telecom SudParis, France
Goichiro Hanaoka, National Institute of Advanced Industrial Science and Technology (AIST), Tokyo, Japan
Xinyi Huang, Fujian Normal University, China
Sokratis K. Katsikas, University of Piraeus, Greece
Di Ma, University of Michigan-Dearborn, MI, USA
Heiko Mantel, TU Darmstadt, Germany
Mark Manulis, University of Surrey, Guildford, UK
Fabio Martinelli, CNR, Pisa, Italy
Gregorio Martínez Pérez, University of Murcia, Spain
Vashek Matyas, Masaryk University, Brno, Czechia
Weizhi Meng, Technical University of Denmark, Lyngby, Denmark
Masakatsu Nishigaki, Shizuoka University, Japan
Eiji Okamoto, University of Tsukuba, Japan
Rolf Oppliger
, eSECURITY Technologies, Bern, Switzerland
Josef Pieprzyk, Macquarie University, Sydney, NSW, Australia
Joachim Posegga, University of Passau, Germany
Reihaneh Safavi-Naini, University of Calgary, Canada
Miguel Soriano, Technical University of Catalonia, Barcelona, Spain
Angelos Stavrou, George Mason University, Fairfax, VA, USA
Willy Susilo, University of Wollongong, Australia
Guilin Wang, Huawei, Singapore
Jeff Yan, Lancaster University, UK

Advisory Board

Thomas Berson, Anagram Laboratories, Palo Alto, CA, USA
G.R. Blakley, Texas A & M University, College Station, TX, USA
William Caelli, Queensland University of Technology, Brisbane, QLD, Australia
Chin-Chen Chang, National Chung Cheng University, Chiayi, Taiwan
Norihisa Doi, Chuo University, Tokyo, Japan
Roberto Gorrieri, University of Bologna, Italy
Hideki Imai, Chuo University, Tokyo, Japan
Carl Landwehr, University of Maryland, College Park, MD, USA
John McHugh, Dalhousie University, Halifax, NS, Canada
Günter Müller, Albert-Ludwig University of Freiburg, Germany
Peter Neumann, SRI International, Menlo Park, CA, USA
Man Young Rhee, Seoul National University, Korea
Eugene Spafford, Purdue University, West Lafayette, IN, USA
Joos Vandewalle, K.U. Leuven, Belgium
Guozhen Xiao, Xidian University, Xian, China
Moti Yung, Google Inc, USA

Read this Journal on Springerlink

For authors and editors

  • Journal Citation Reports®
    2017 Impact Factor
  • 1.658
  • Aims and Scope

    Aims and Scope


    The International Journal of Information Security is an English language international journal on research in information security.

    Information security builds on computer security and applied cryptography, but also reaches out to other branches of the information sciences. Information security is an important aspect of protecting the information society from a wide variety of threats.

    The number and the sizes of international conferences treating information security grow with each passing year, as does the quantity of significant publishable technical work in this area. But much of this work appears too long after the need for it has arisen, if at all, or in journals with specialist readerships not including many of those to whom it would be most valuable. Moreover, we do not have journals covering applications and the implementation of security techniques, topics which are important in industry and the business world.

    In this new century, The International Journal of Information Security will provide prompt publication of important technical work in information security, whether theoretical, applicable, or related to implementation.

    The intended audience includes any person, whether active in the technology or not, whose interests in communications, commerce, banking, medicine, or other areas of endeavor are affected by information security.

    The intended author is a technical specialist with the skill and commitment to presenting recent advances in information security to a broad audience around the world.

    The intended review process will be peer review by members of the editorial board, with recourse to outside experts where appropriate.

    The scope of the International Journal of Information Security (IJIS) is theory, applications, and implementations of information security. This includes, but is not limited to:

    - system security - intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation
    - network security - Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures
    - content protection - software protection, tamper resistant software
    - applications - electronic commerce, electronic government, health, telecommunications, mobility
    - foundations - privacy, access control, authentication, identification, applied cryptography, formal methods in information security

    G.R. Blakley, College Station, TX, USA
    G. Davida, Milwaukee, WI, USA
    E. Dawson, Brisbane, Australia
    D. Gollmann, Cambridge, UK
    C.A. Meadows, Washington, DC, USA
    E. Okamoto, Funabashi, Japan

  • Submit Online
  • Open Choice - Your Way to Open Access
  • Instructions for Authors

    Instructions for Authors


  • Author Academy: Training for Authors
  • English Language Editing

    English Language Editing


  • CfP: IoT Security and Privacy (pdf, 24 k...
  • CfP: Security and Privacy of Blockchain ...
  • Copyright Information

    Copyright Information


    Copyright Information

    For Authors

    Submission of a manuscript implies: that the work described has not been published before (except in form of an abstract or as part of a published lecture, review or thesis); that it is not under consideration for publication elsewhere; that its publication has been approved by all co-authors, if any, as well as – tacitly or explicitly – by the responsible authorities at the institution where the work was carried out.

    Author warrants (i) that he/she is the sole owner or has been authorized by any additional copyright owner to assign the right, (ii) that the article does not infringe any third party rights and no license from or payments to a third party is required to publish the article and (iii) that the article has not been previously published or licensed. The author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. Transfer of copyright to Springer (respectively to owner if other than Springer) becomes effective if and when a Copyright Transfer Statement is signed or transferred electronically by the corresponding author. After submission of the Copyright Transfer Statement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted by Springer.

    The copyright to this article, including any graphic elements therein (e.g. illustrations, charts, moving images), is assigned for good and valuable consideration to Springer effective if and when the article is accepted for publication and to the extent assignable if assignability is restricted for by applicable law or regulations (e.g. for U.S. government or crown employees).

    The copyright assignment includes without limitation the exclusive, assignable and sublicensable right, unlimited in time and territory, to reproduce, publish, distribute, transmit, make available and store the article, including abstracts thereof, in all forms of media of expression now known or developed in the future, including pre- and reprints, translations, photographic reproductions and microform. Springer may use the article in whole or in part in electronic form, such as use in databases or data networks for display, print or download to stationary or portable devices. This includes interactive and multimedia use and the right to alter the article to the extent necessary for such use.

    Authors may self-archive the Author's accepted manuscript of their articles on their own websites. Authors may also deposit this version of the article in any repository, provided it is only made publicly available 12 months after official publication or later. He/she may not use the publisher's version (the final article), which is posted on SpringerLink and other Springer websites, for the purpose of self-archiving or deposit. Furthermore, the Author may only post his/her version provided acknowledgement is given to the original source of publication and a link is inserted to the published article on Springer's website. The link must be accompanied by the following text: "The final publication is available at link.springer.com".

    Prior versions of the article published on non-commercial pre-print servers like arXiv.org can remain on these servers and/or can be updated with Author's accepted version. The final published version (in pdf or html/xml format) cannot be used for this purpose. Acknowledgement needs to be given to the final publication and a link must be inserted to the published article on Springer's website, accompanied by the text "The final publication is available at link.springer.com". Author retains the right to use his/her article for his/her further scientific career by including the final published journal article in other publications such as dissertations and postdoctoral qualifications provided acknowledgement is given to the original source of publication.

    Author is requested to use the appropriate DOI for the article. Articles disseminated via link.springer.com are indexed, abstracted and referenced by many abstracting and information services, bibliographic networks, subscription agencies, library networks, and consortia.

    For Readers

    While the advice and information in this journal is believed to be true and accurate at the date of its publication, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may have been made. The publisher makes no warranty, express or implied, with respect to the material contained herein.

    All articles published in this journal are protected by copyright, which covers the exclusive rights to reproduce and distribute the article (e.g., as offprints), as well as all translation rights. No material published in this journal may be reproduced photographically or stored on microfilm, in electronic data bases, video disks, etc., without first obtaining written permission from the publisher (respectively the copyright owner if other than Springer). The use of general descriptive names, trade names, trademarks, etc., in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.

    Springer has partnered with Copyright Clearance Center's RightsLink service to offer a variety of options for reusing Springer content. For permission to reuse our content please locate the material that you wish to use on link.springer.com or on springerimages.com and click on the permissions link or go to copyright.com, then enter the title of the publication that you wish to use. For assistance in placing a permission request, Copyright Clearance Center can be connected directly via phone: +1-855-239-3415, fax: +1-978-646-8600, or e-mail: info@copyright.com.

    © Springer-Verlag Berlin Heidelberg

Alerts for this journal


Get the table of contents of every new issue published in International Journal of Information Security.