change style to default Text Only

Skip navigation.

IEE Proceedings – Information Security

Free access

As part of a special promotion, the full-text of this title is available free of charge for all IET Digital Library users until the end of 2006.


As part of a special promotion, the full-text of this title is available free of charge until the end of 2006 for all IET Digital Library users.

The editors of IEE Proceedings – Information Security journal seek original research papers in the following areas of information security and cryptography. Submitting authors should specify clearly in their covering statement the area into which their paper falls:

  • Access Control and Database Security
  • Ad-Hoc Network Aspects
  • Anonymity and E-Voting
  • Authentication
  • Biometrics
  • Block Ciphers and Hash Functions
  • Broadcast Encryption and Traitor Tracing
  • Combinatorial Aspects
  • Covert Channels and Information Flow
  • Critical Infrastructures
  • Cryptanalysis
  • Dependability
  • Digital Rights Management
  • Digital Signature Schemes
  • Digital Steganography
  • Economic Aspects of Information Security
  • Elliptic Curve Cryptography and Number Theory
  • Embedded Systems Aspects
  • Embedded Systems Security and Forensics
  • Financial Cryptography
  • Firewall Security
  • Formal Methods and Security Verification
  • Human Aspects
  • Information Warfare and Survivability
  • Intrusion Detection
  • Java and XML Security
  • Key Distribution
  • Key Management and Secret Sharing
  • Malware
  • Multi-Party Computation and Threshold Cryptography
  • Peer-to-peer Security
  • PKIs
  • Public-Key and Hybrid Encryption
  • Quantum Cryptography
  • Risks of using Computers
  • Robust Networks
  • Secure Electronic Commerce
  • Software Obfuscation
  • Stream Ciphers
  • Trust Models
  • Watermarking and Fingerprinting

Paper of the Month

Blind Newton sensitivity attack, Vol.153, No.3, p.115-125

Citing this journal
IEE Proceedings – Information security is usually cited by the abbreviated title ‘IEE Proc., Inf. Secur.’ Every article in this journal is assigned a Crossref DOI, which is displayed below the article abstract.

Recent and Forthcoming Special Issues

  • Cryptographic Algorithms and Architectures for System-on-Chip
  • Digital Watermarking

Author and Reader Benefits

  • Online Submissions and tracking platform
  • Prompt and rigorous peer review
  • Fast publication with advance online publication
  • No page charges
  • Worldwide readership and database coverage

Access to the full-text of this journal is available free to all users of the IET Digital Library until the end of 2006. IEE Proceedings journals are available in print and online in advance of printed publication on the IET Digital Library. IEE Proceedings journals are also available as part of the IEEE/IET Electronic Library (IEL).