Journal Information
EURASIP Journal on Information Security
https://jis-eurasipjournals.springeropen.com/Impact Factor: |
2.1 |
Publisher: |
Springer |
ISSN: |
1687-417X |
Viewed: |
24303 |
Tracked: |
19 |
Call For Papers
Aims and scope The overall goal of the Journal on Information Security is to bring together researchers and practitioners dealing with the general field of information forensics, information security and privacy, biometrics, surveillance and systems applications with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby forensics, security and privacy are achieved through a combination of techniques from applied cryptography, software-, hardware- and network security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal.
Last updated by Dou Sun in 2026-01-04
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| The Information Society | 3.0 | Taylor & Francis | 0197-2243 | |
| a | IEEE Transactions on Information Theory | 2.9 | IEEE | 0018-9448 |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| ACM Journal of Data and Information Quality | 1.500 | ACM | 1936-1955 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| Information Polity | 1.300 | IOS Press | 1570-1255 | |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |
Related Conferences
| CCF | CORE | QUALIS | Short | Full Name | Submission | Notification | Conference |
|---|---|---|---|---|---|---|---|
| b | b3 | ICISS | International Conference on Information Systems Security | 2025-08-10 | 2025-10-03 | 2025-12-16 | |
| c | INSCRYPT | International Conference on Information Security and Cryptology | 2025-06-15 | 2025-08-01 | 2025-10-19 | ||
| c | b | a2 | ISC | Information Security Conference | 2025-06-04 | 2025-07-29 | 2025-10-20 |
| c | b | b1 | ICICS | International Conference on Information and Communications Security | 2025-05-23 | 2025-07-21 | 2025-10-29 |
| c | ACISP | Australasian Conference on Information Security and Privacy | 2025-02-19 | 2025-04-08 | 2025-07-14 | ||
| b | b1 | ISIT | International Symposium on Information Theory | 2019-01-20 | 2019-03-31 | 2019-07-07 | |
| c | ISA' | International Conference on Information Security and Assurance | 2016-01-30 | 2016-02-15 | 2016-03-24 | ||
| c | IAS | International Conference on Information Assurance and Security | 2015-10-21 | 2015-11-10 | 2015-12-07 | ||
| b | ICISC | International Conference on Information Security and Cryptology | 2015-09-07 | 2015-10-19 | 2015-11-25 | ||
| b | ITW | Information Theory Workshop | 2013-07-12 | 2013-09-09 |