缩写名/全名 |
INT J INF SECUR
International Journal of Information Security |
||||||||||||||||||||||||||||
ISSN号 | 1615-5262 | ||||||||||||||||||||||||||||
研究方向 | 工程技术-计算机:理论方法 | ||||||||||||||||||||||||||||
影响因子 | 2015:1.279, 2016:1.915, 2017:1.658, 2018:1.822, 2019:1.494, | ||||||||||||||||||||||||||||
出版国家 | GERMANY | ||||||||||||||||||||||||||||
出版周期 | Bimonthly | ||||||||||||||||||||||||||||
年文章数 | 34 | ||||||||||||||||||||||||||||
出版年份 | 0 | ||||||||||||||||||||||||||||
是否OA | No | ||||||||||||||||||||||||||||
审稿周期(仅供参考) | 平均12.0个月 |
||||||||||||||||||||||||||||
录用比例 | 约75% | ||||||||||||||||||||||||||||
投稿链接 | https://www.editorialmanager.com/ijis/ | ||||||||||||||||||||||||||||
投稿官网 | http://www.springer.com/computer/security+and+cryptology/journal/10207 | ||||||||||||||||||||||||||||
h-index | 35 | ||||||||||||||||||||||||||||
CiteScore |
|
||||||||||||||||||||||||||||
PubMed Central (PMC)链接 | http://www.ncbi.nlm.nih.gov/nlmcatalog?term=1615-5262%5BISSN%5D | ||||||||||||||||||||||||||||
中科院SCI期刊分区 ( 2018年新版本) |
|
||||||||||||||||||||||||||||
中科院SCI期刊分区 ( 2020年新版本) |
|
中国学者近期发表的论文 | |
1. | Shoulder-surfing-proof graphical password authentication scheme Author: Tzong-Sun Wu, Ming-Lun Lee, Han-Yu Lin, Chao-Yuan Wang Journal: International Journal of Information Security, 2013, Vol.13, 245-254, DOI:10.1007/s10207-013-0216-7 DOI |
2. | Provably secure E-cash system with practical and efficient complete tracing Author: Bin Lian, Gongliang Chen, Jianhua Li Journal: International Journal of Information Security, 2014, Vol.13, 271-289, DOI:10.1007/s10207-014-0240-2 DOI |
3. | Risk balance defense approach against intrusions for network server Author: Chengpo Mu, Meng Yu, Yingjiu Li, Wanyu Zang Journal: International Journal of Information Security, 2013, Vol.13, 255-269, DOI:10.1007/s10207-013-0214-9 DOI |
4. | Trusted mobile model based on DTE technology Author: Tao Li, Aiqun Hu Journal: International Journal of Information Security, 2014, Vol.14, 457-469, DOI:10.1007/s10207-014-0266-5 DOI |
5. | Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation Author: Huiling Qian, Jiguo Li, Yichen Zhang, Jinguang Han Journal: International Journal of Information Security, 2014, Vol.14, 487-497, DOI:10.1007/s10207-014-0270-9 DOI |
6. | Flexible attribute-based encryption applicable to secure e-healthcare records Author: Bo Qin, Hua Deng, Qianhong Wu, Josep Domingo-Ferrer, David Naccache, Yunya Zhou Journal: International Journal of Information Security, 2015, Vol.14, 499-511, DOI:10.1007/s10207-014-0272-7 DOI |
7. | Efficient wildcard search over encrypted data Author: Changhui Hu, Lidong Han Journal: International Journal of Information Security, 2015, Vol.15, 539-547, DOI:10.1007/s10207-015-0302-0 DOI |
8. | Secure three-party computational protocols for triangle area Author: Liang Liu, Xiaofeng Chen, Wenjing Lou Journal: International Journal of Information Security, 2015, Vol.15, 1-13, DOI:10.1007/s10207-015-0284-y DOI |
9. | Malware detection using bilayer behavior abstraction and improved one-class support vector machines Author: Qiguang Miao, Jiachen Liu, Ying Cao, Jianfeng Song Journal: International Journal of Information Security, 2015, Vol.15, 361-379, DOI:10.1007/s10207-015-0297-6 DOI |
10. | Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption Author: Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Yan Li Journal: International Journal of Information Security, 2015, Vol.15, 35-50, DOI:10.1007/s10207-015-0287-8 DOI |
|
|