IET信息安全在信息安全和密碼學(xué)的以下領(lǐng)域發(fā)表原始研究論文。提交論文的作者應(yīng)在其封面聲明中明確說(shuō)明論文所涉及的領(lǐng)域。訪問(wèn)控制和數(shù)據(jù)庫(kù)安全即席網(wǎng)絡(luò)方面匿名和電子投票認(rèn)證分組密碼和哈希函數(shù)區(qū)塊鏈,比特幣(僅技術(shù)方面)廣播加密和叛徒追蹤組合方面秘密渠道和信息流關(guān)鍵基礎(chǔ)設(shè)施密碼分析可靠性數(shù)字版權(quán)管理數(shù)字簽名方案數(shù)字隱寫(xiě)術(shù)信息安全的經(jīng)濟(jì)方面橢圓曲線密碼學(xué)與數(shù)論嵌入式系統(tǒng)方面嵌入式系統(tǒng)安全與取證金融密碼術(shù)防火墻安全正式方法和安全驗(yàn)證人的方面信息戰(zhàn)與生存能力入侵檢測(cè)Java與XML安全密鑰分發(fā)密鑰管理惡意軟件多方計(jì)算與門(mén)限加密對(duì)等安全PKIS公鑰和混合加密量子密碼術(shù)使用計(jì)算機(jī)的風(fēng)險(xiǎn)魯棒網(wǎng)絡(luò)秘密共享安全電子商務(wù)軟件迷亂流密碼信任模型水印和指紋
IET Information Security publishes original research papers in the following areas of information security and cryptography. Submitting authors should specify clearly in their covering statement the area into which their paper falls.Access Control and Database SecurityAd-Hoc Network AspectsAnonymity and E-VotingAuthenticationBlock Ciphers and Hash FunctionsBlockchain, Bitcoin (Technical aspects only)Broadcast Encryption and Traitor TracingCombinatorial AspectsCovert Channels and Information FlowCritical InfrastructuresCryptanalysisDependabilityDigital Rights ManagementDigital Signature SchemesDigital SteganographyEconomic Aspects of Information SecurityElliptic Curve Cryptography and Number TheoryEmbedded Systems AspectsEmbedded Systems Security and ForensicsFinancial CryptographyFirewall SecurityFormal Methods and Security VerificationHuman AspectsInformation Warfare and SurvivabilityIntrusion DetectionJava and XML SecurityKey DistributionKey ManagementMalwareMulti-Party Computation and Threshold CryptographyPeer-to-peer SecurityPKIsPublic-Key and Hybrid EncryptionQuantum CryptographyRisks of using ComputersRobust NetworksSecret SharingSecure Electronic CommerceSoftware ObfuscationStream CiphersTrust ModelsWatermarking and Fingerprinting
SCI熱門(mén)推薦期刊 >
SCI常見(jiàn)問(wèn)題 >
職稱(chēng)論文常見(jiàn)問(wèn)題 >
EI常見(jiàn)問(wèn)題 >