Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)

 

Facts & Figures

Publication starting date

 2009

h-index

 15

i10-index

 23

Citations

820

Issue per year

3

No. of volumes

13

No. of issues

 26

No. of articles

 216

PDF Download

 744,465

View Per Article

 4363.38

PDF Download Per Article

 3446.6

Acceptance Rate

15

Accept Date (Days)

175

Number of Indexing Databases

15

 

 

The ISC International Journal of Information Security (ISeCureis a peer reviewed scholarly publication by Iranian Society of Cryptology. ISeCure is published biannually in print and online with full texts of articles made available for free on the website of the journal under ISeCure open access policy. ISeCure is devoted to publishing theoretical scholarship on a variety of topics related to information security. The intended audience of the journal is any person with an interest in information security from an academic perspective such as engineers, mathematicians and computer scientists. A partial list of topics for review by the journal can be found in the Aims and Scope section. Manuscript types for submission are research papers, review papers, case reports, short communications and letters to the editor.  More information about the policies of the journal can be found on the About Journal and mostly in the Publication Ethics pages. To start a new submission, please first read the Guide for Authors page for detailed information about manuscript format, style and other requirements. Manuscript submission, refereeing and publishing are completely free of charge. New manuscripts should be submitted online by the corresponding author through the website after registration. Articles published in ISeCure Journal are indexed in the Emerging Sources Citation Index (ESCI) database of Web of Science/ISI.

Follow us:

 

 

 

Research Article
1. OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing

K. Nalini Sujantha Bel; I.Shatheesh Sam

Volume 13, Issue 1 , Winter and Spring 2021, Pages 1-17

http://dx.doi.org/10.22042/isecure.2020.209056.497

Abstract
  A novel feature extraction algorithm using Otsu’s Threshold (OT-features) on scrambled images and the Instantaneous Clustering (IC-CBIR) approach is proposed for Content-Based Image Retrieval in cloud computing. Images are stored in the cloud in an encrypted or scrambled form to preserve the privacy ...  Read More

Research Article
2. Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets

Vahid Meraji; Hadi Soleimany

Volume 13, Issue 1 , Winter and Spring 2021, Pages 19-27

http://dx.doi.org/10.22042/isecure.2020.209945.500

Abstract
  Numerous studies have been conducted to present new attacks using the time difference between the processor access to main memory and cache memory. Access-driven attacks are a series of cache-based attacks using fewer measurement samples to extract sensitive key values due to the ability of the attacker ...  Read More

Research Article
3. A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration

Nastaran Shekofte; Siavash Bayat Sarmadi; hatameh Mosanaei Boorani

Volume 13, Issue 1 , Winter and Spring 2021, Pages 29-45

http://dx.doi.org/10.22042/isecure.2020.196541.477

Abstract
  ‎Hardware Trojans have emerged as a major concern for integrated circuits in recent years‎. ‎As a result‎, ‎detecting Trojans has become an important issue in critical applications‎, ‎such as finance and health‎. ‎The Trojan detection methods are mainly categorized ...  Read More

Research Article
4. Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing

Mansoureh Labbafniya; Shahram Etemadi Borujeni; Roghaye Saeidi

Volume 13, Issue 1 , Winter and Spring 2021, Pages 47-57

http://dx.doi.org/10.22042/isecure.2020.215265.510

Abstract
   Nowadays the security of the design is so important because of the different available attacks to the system. the main aim of this paper is to improve the security of the circuit design implemented on FPGA device. Two approaches are proposed for this purpose. The first is to fill out empty space ...  Read More

Research Article
5. An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery

Salome James; Gowri Thumbur; P.Vasudeva Reddy

Volume 13, Issue 1 , Winter and Spring 2021, Pages 59-72

http://dx.doi.org/10.22042/isecure.2020.208473.495

Abstract
  In recent years, due to their potential applications, proxy blind signatures became an active research topic and are an extension of the basic proxy signature. A proxy blind signature scheme enables a proxy signer to produce a blind signature on behalf of an original signer. Such schemes are useful in ...  Read More

Research Article
6. Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case

Vahid Chegeni; Hamid Haj Seyyed Javadi; Mohammad Reza Moazami Goudarzi; Afshin Rezakhani

Volume 13, Issue 1 , Winter and Spring 2021, Pages 73-85

http://dx.doi.org/10.22042/isecure.2020.226400.535

Abstract
  Today, the Internet of Things (IoT) is one of the emerging technologies that enable the connection and transfer of information through communication networks. The main idea of the IoT is the widespread presence of objects such as mobile devices, sensors, and RFID. With the increase in traffic volume ...  Read More

Research Article
1. The Use of Local Sensitive Hashing for E-learner Face Identification

Hachem H. Alaoui; Elkaber Hachem; Cherif Ziti; Mohammed Karim

Articles in Press, Accepted Manuscript, Available Online from 30 November 2020

http://dx.doi.org/10.22042/isecure.2021.271051.612

Abstract
  Because face can reveal so much hidden information, we need to interpret these data and benefit from them. Hence, our paper shows a new and productive facial image representation based on local sensitive hashing (LSH). This strategy makes it conceivable to recognize the students who pursue their preparation ...  Read More

Research Article
2. Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications

Aymen M. Al-Kadhimi; Salim A. Mohammed Ali; Sami Hasan

Articles in Press, Accepted Manuscript, Available Online from 30 August 2020

http://dx.doi.org/10.22042/isecure.2021.271055.613

Abstract
  This paper involves the design of asymmetrical generalized Chebyshev low-pass filter realized with a suspended substrate stripline. The study presents the synthesis and design of an asymmetrical prototype with a degree of 11, the cut-off frequency of 2.5 GHz, better than 26 dB as passband return loss ...  Read More

Research Article
3. Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox

Osama Ali Awad; Mais Monqith

Articles in Press, Accepted Manuscript, Available Online from 30 August 2020

http://dx.doi.org/10.22042/isecure.2021.271058.614

Abstract
  Wireless Networked Control System (WNCS) consists of a control system and communication network system. The insertion of the communication network in control systems has enormous advantages but on the other hand, it brings several issues like network induced delays or packet dropouts that bring negative ...  Read More

Research Article
4. A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks

Abdllkader Esaid; Mary Agoyi; Muhannad Tahboush

Articles in Press, Accepted Manuscript, Available Online from 30 November 2020

http://dx.doi.org/10.22042/isecure.2021.271065.619

Abstract
  Ad hoc network is infrastructure-less support, so network nodes are vulnerable to many attacks. Security attacks in Ad-Hoc networks are increasing significantly with time. They communicated and exchanged data should be also secured and kept confidential. Therefore, hybrid cryptography is proposed to ...  Read More

Research Article
5. CEMD: A Cluster-based Ensemble Motif Discovery Tool

Sumayia Al-Anazi; Isra Al-Turaiki; Najwa Altwaijry

Articles in Press, Accepted Manuscript, Available Online from 30 November 2020

http://dx.doi.org/10.22042/isecure.2021.271073.623

Abstract
  Motif discovery is a challenging problem in bioinformatics. It is an essential step towards understanding gene regulation. Although numerous algorithms and tools have been proposed in the literature, the accuracy of motif finding is still low. In this paper, we tackle the motif discovery problem using ...  Read More

Research Article
6. Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network

Isra Al-Turaiki; Najwa Altwaijry; Abeer Agil; Haya Aljodhi; sara Alharbi; Lina Alqassem

Articles in Press, Accepted Manuscript, Available Online from 30 August 2020

http://dx.doi.org/10.22042/isecure.2021.271076.624

Abstract
  With present-day technological advancements, the number of devices connected to the Internet has increased dramatically. Cybersecurity attacks are increasingly becoming a threat to individuals and organizations. Contemporary security frameworks incorporate Network Intrusion Detection Systems (NIDS). ...  Read More

Research Article
7. The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia

Saja Ahmed Albliwi; Hanan Abdullah Alkharmani

Articles in Press, Accepted Manuscript, Available Online from 30 November 2020

http://dx.doi.org/10.22042/isecure.2021.271079.625

Abstract
  With the revolution in mobile technologies and the growing number of mobile internet users, Mobile Payment was born as a convenient channel of communication between customers and firms or organizations. Nowadays, Mobile Payments are on the way to disrupting the traditional Payment methods and contributing ...  Read More

Research Article
8. A New Derivation of the Leftover Hash Lemma

Marcelo S. Alencar; Karcius D. R. Assis

Articles in Press, Accepted Manuscript, Available Online from 03 November 2020

http://dx.doi.org/10.22042/isecure.2021.271070.622

Abstract
  This paper reviews the characteristics of the main digest algorithms, and presents a new derivation of the leftover hash lemma, using the collision probability to derive an upper bound on the statistical distance between the key and seed joint probability, and the hash bit sequence distribution. The ...  Read More

Research Article
9. Identifying Entrepreneurial Influencers on Twitter

Bodor Almotairy; Manal Abdullah; Rabeeh Abbasi

Articles in Press, Accepted Manuscript, Available Online from 07 November 2020

http://dx.doi.org/10.22042/isecure.2021.271108.629

Abstract
  Entrepreneurship involves an immense network of activities, linked via collaborations and information propagation. Information dissemination is extremely important for entrepreneurs. Finding influential users with high levels of interaction and connectivity in social media and involving them in information ...  Read More

Research Article
10. Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer

Shereen S. Jumaa

Articles in Press, Accepted Manuscript, Available Online from 10 November 2020

http://dx.doi.org/10.22042/isecure.2021.271062.616

Abstract
  Simple signs existent in mammograms for diagnosing breast cancer are considered to be microcalcifications or MCs. Therefore, true detection of MCs is needed to minimize schedule diagnosis, efficient care and death rate due to breast cancer. A challenging task is to evaluate and interpret mammograms and, ...  Read More

Research Article
11. Indexed View Technique to Speed-up Data Warehouse Query Processing

Talib M. J. Al Taleb; Sami Hasan; Yaqoob Yousif Mahdi

Articles in Press, Accepted Manuscript, Available Online from 10 November 2020

http://dx.doi.org/10.22042/isecure.2021.271059.615

Abstract
  The data warehouse size and query complexity may cause an unacceptable delay in decision support queries. A basic condition for the success of a data warehouse is the capability to supply decision-makers with both precise information and best response time. For this purpose, the concept of indexed views ...  Read More

Research Article
12. The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case

Mustapha Bassiri; Abderrazak Mazouak; Imad Lamniai; Malika Tridane; Said Belaaouad; Said Belaaouad

Articles in Press, Accepted Manuscript, Available Online from 14 November 2020

http://dx.doi.org/10.22042/isecure.2021.271064.618

Abstract
  The application of New Information and Communication Technologies (NICT) in the field of training led to the creation of this new reality called distance learning. Described as the marriage of multimedia (sound, image, text) and the Internet (online distribution, interactivity) DT has no doubt allowed ...  Read More

Keywords Cloud