The scope of this journal includes:
/// Access Control and Database Security
/// Ad-Hoc Network Aspects
/// Anonymity and E-Voting
/// Authentication
/// Block Ciphers and Hash Functions
/// Blockchain, Bitcoin (Technical aspects only)
/// Broadcast Encryption and Traitor Tracing
/// Combinatorial Aspects
/// Covert Channels and Information Flow
/// Critical Infrastructures
/// Cryptanalysis
/// Dependability
/// Digital Banking
/// Digital Currencies
/// Digital Rights Management
/// Digital Signature Schemes
/// Digital Steganography
/// Economic Aspects of Information Security
/// Elliptic Curve Cryptography and Number Theory
/// Embedded Systems Aspects
/// Embedded Systems Security and Forensics
/// Financial Cryptography
/// Firewall Security
/// Formal Methods and Security Verification
/// Human Aspects
/// Information Warfare and Survivability
/// Intrusion Detection
/// Java and XML Security
/// Key Distribution
/// Key Management
/// Malware
/// Multi-Party Computation and Threshold Cryptography
/// Peer-to-peer Security
/// PKIs
/// Public-Key and Hybrid Encryption
/// Quantum Cryptography
/// Risks of using Computers
/// Robust Networks
/// Secret Sharing
/// Secure Electronic Commerce
/// Software Obfuscation
/// Stream Ciphers
/// Trust Models
/// Watermarking and Fingerprinting