The scope of this journal includes:
- Access Control and Database Security
- Ad-Hoc Network Aspects
- Anonymity and E-Voting
- Authentication
- Block Ciphers and Hash Functions
- Blockchain, Bitcoin (Technical aspects only)
- Broadcast Encryption and Traitor Tracing
- Combinatorial Aspects
- Covert Channels and Information Flow
- Critical Infrastructures
- Cryptanalysis
- Dependability
- Digital Banking
- Digital Currencies
- Digital Rights Management
- Digital Signature Schemes
- Digital Steganography
- Economic Aspects of Information Security
- Elliptic Curve Cryptography and Number Theory
- Embedded Systems Aspects
- Embedded Systems Security and Forensics
- Financial Cryptography
- Firewall Security
- Formal Methods and Security Verification
- Human Aspects
- Information Warfare and Survivability
- Intrusion Detection
- Java and XML Security
- Key Distribution
- Key Management
- Malware
- Multi-Party Computation and Threshold Cryptography
- Peer-to-peer Security
- PKIs
- Public-Key and Hybrid Encryption
- Quantum Cryptography
- Risks of using Computers
- Robust Networks
- Secret Sharing
- Secure Electronic Commerce
- Software Obfuscation
- Stream Ciphers
- Trust Models
- Watermarking and Fingerprinting