change style to default Text Only

Skip navigation.


IET Information Security (formerly IEE Proceedings – Information Security)


Scope

IET Information Security (formerly IEE Proceedings Information Security) publishes original research papers in the following areas of information security and cryptography. Submitting authors should specify clearly in their covering statement the area into which their paper falls:

  • Access Control and Database Security
  • Ad-Hoc Network Aspects
  • Anonymity and E-Voting
  • Authentication
  • Biometrics
  • Block Ciphers and Hash Functions
  • Broadcast Encryption and Traitor Tracing
  • Combinatorial Aspects
  • Covert Channels and Information Flow
  • Critical Infrastructures
  • Cryptanalysis
  • Dependability
  • Digital Rights Management
  • Digital Signature Schemes
  • Digital Steganography
  • Economic Aspects of Information Security
  • Elliptic Curve Cryptography and Number Theory
  • Embedded Systems Aspects
  • Embedded Systems Security and Forensics
  • Financial Cryptography
  • Firewall Security
  • Formal Methods and Security Verification
  • Human Aspects
  • Information Warfare and Survivability
  • Intrusion Detection
  • Java and XML Security
  • Key Distribution
  • Key Management and Secret Sharing
  • Malware
  • Multi-Party Computation and Threshold Cryptography
  • Peer-to-peer Security
  • PKIs
  • Public-Key and Hybrid Encryption
  • Quantum Cryptography
  • Risks of using Computers
  • Robust Networks
  • Secure Electronic Commerce
  • Software Obfuscation
  • Stream Ciphers
  • Trust Models
  • Watermarking and Fingerprinting

Featured Paper

Plateau characteristics, Vol.1, No.1, p.11-17

Forthcoming Special Issue

Citing this journal
IET Information Security is usually cited by the abbreviated title ‘IET Inf. Secur.’ Every article in this journal is assigned a Crossref DOI, which is displayed below the article abstract.

Author and Reader Benefits

  • Online Submissions and tracking platform
  • Prompt and rigorous peer review
  • Fast publication with advance online publication
  • No page charges
  • Worldwide readership and database coverage

The IET Research Journals are available in print and online in advance of printed publication on the IET Digital Library. The IET Research journals are also available as part of the IEEE/IET Electronic Library (IEL).

Journal name change for 2007

IET Information Security was previously published as IEE Proceedings Information Security. Following the merger on March 31st 2006 between the IEE (Institution of Electrical Engineers) and the IIE (The Institution of Incorporated Engineers) to form the Institution of Engineering and Technology, the IEE Proceedings suite of journals have changed name for 2007 to reflect the fact that they are now published by the Institution of Engineering and Technology. IET Information Security starts from Volume 1, Issue 1 from March 2007 onwards. All other benefits of publishing in the journal, including our worldwide readership and database coverage, remain unchanged.

Online subscribers to IET Information Security can also access all backfile issues of IEE Proceedings Information Security from 2005-2006 as part of their current online subscription.