IET Information Security publishes original research papers in the following areas of information security and cryptography. Submitting authors should specify clearly in their covering statement the area into which their paper falls.Scope: Access Control and Database SecurityAd-Hoc Network AspectsAnonymity and E-VotingAuthenticationBlock Ciphers and Hash FunctionsBlockchain, Bitcoin (Technical aspects only)Broadcast Encryption and Traitor TracingCombinatorial AspectsCovert Channels and Information FlowCritical InfrastructuresCryptanalysisDependabilityDigital Rights ManagementDigital Signature SchemesDigital SteganographyEconomic Aspects of Information SecurityElliptic Curve Cryptography and Number TheoryEmbedded Systems AspectsEmbedded Systems Security and ForensicsFinancial CryptographyFirewall SecurityFormal Methods and Security VerificationHuman AspectsInformation Warfare and SurvivabilityIntrusion DetectionJava and XML SecurityKey DistributionKey ManagementMalwareMulti-Party Computation and Threshold CryptographyPeer-to-peer SecurityPKIsPublic-Key and Hybrid EncryptionQuantum CryptographyRisks of using ComputersRobust NetworksSecret SharingSecure Electronic CommerceSoftware ObfuscationStream CiphersTrust ModelsWatermarking and FingerprintingSpecial Issues. Current Call for Papers: Security on Mobile and IoT devices - https://digital-library.theiet.org/files/IET_IFS_SMID_CFP.pdf
IET Information Security在以下信息安全和密码学领域发表原创研究论文。提交论文的作者应在说明书中明确说明论文所福尔斯的领域。范围:访问控制和数据库安全Ad-Hoc网络方面匿名性和电子投票身份验证块密码和哈希函数区块链,比特币(仅技术方面)广播加密和叛逆者跟踪组合方面隐蔽通道和信息流关键基础架构密码分析可靠性数字权限管理数字签名方案数字隐写术信息安全的经济方面椭圆曲线密码术和数论嵌入式系统方面嵌入式系统安全和取证金融加密技术防火墙安全性形式化方法和安全验证人的因素信息战和生存能力入侵检测Java和XML安全性密钥分发密钥管理恶意软件多方计算和阈值加密对等安全性PKI公钥和混合加密量子加密使用计算机的风险稳健网络秘密共享安全电子商务软件混淆流密码信任模型水印和指纹特殊问题。当前征稿:移动的和物联网设备的安全性-https://digital-library.theiet.org/files/IET_IFS_SMID_CFP.pdf