Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)

 

Facts & Figures

Publication starting date

 2009

h-index

 15

i10-index

 23

Citations

 791

Issue per year

3

No. of volumes

13

No. of issues

 26

No. of articles

 204

PDF Download

 740,945

View Per Article

 4595.44

PDF Download Per Article

 3632.08

Acceptance Rate

14

Accept Date (Days)

203

Number of Indexing Databases

16

 

 

The ISC International Journal of Information Security (ISeCureis a peer reviewed scholarly publication by Iranian Society of Cryptology. ISeCure is published biannually in print and online with full texts of articles made available for free on the website of the journal under ISeCure open access policy. ISeCure is devoted to publishing theoretical scholarship on a variety of topics related to information security. The intended audience of the journal is any person with an interest in information security from an academic perspective such as engineers, mathematicians and computer scientists. A partial list of topics for review by the journal can be found in the Aims and Scope section. Manuscript types for submission are research papers, review papers, case reports, short communications and letters to the editor.  More information about the policies of the journal can be found on the About Journal and mostly in the Publication Ethics pages. To start a new submission, please first read the Guide for Authors page for detailed information about manuscript format, style and other requirements. Manuscript submission, refereeing and publishing are completely free of charge. New manuscripts should be submitted online by the corresponding author through the website after registration. Articles published in ISeCure Journal are indexed in the Emerging Sources Citation Index (ESCI) database of Web of Science/ISI.

Follow us:

 

 

 

Research Article
1. OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing

K. Nalini Sujantha Bel; I.Shatheesh Sam

Volume 13, Issue 1 , Winter and Spring 2021, Pages 1-17

http://dx.doi.org/10.22042/isecure.2020.209056.497

Abstract
  A novel feature extraction algorithm using Otsu’s Threshold (OT-features) on scrambled images and the Instantaneous Clustering (IC-CBIR) approach is proposed for Content-Based Image Retrieval in cloud computing. Images are stored in the cloud in an encrypted or scrambled form to preserve the privacy ...  Read More

Research Article
2. Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets

Vahid Meraji; Hadi Soleimany

Volume 13, Issue 1 , Winter and Spring 2021, Pages 19-27

http://dx.doi.org/10.22042/isecure.2020.209945.500

Abstract
  Numerous studies have been conducted to present new attacks using the time difference between the processor access to main memory and cache memory. Access-driven attacks are a series of cache-based attacks using fewer measurement samples to extract sensitive key values due to the ability of the attacker ...  Read More

Research Article
3. A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration

Nastaran Shekofte; Siavash Bayat Sarmadi; hatameh Mosanaei Boorani

Volume 13, Issue 1 , Winter and Spring 2021, Pages 29-45

http://dx.doi.org/10.22042/isecure.2020.196541.477

Abstract
  ‎Hardware Trojans have emerged as a major concern for integrated circuits in recent years‎. ‎As a result‎, ‎detecting Trojans has become an important issue in critical applications‎, ‎such as finance and health‎. ‎The Trojan detection methods are mainly categorized ...  Read More

Research Article
4. Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing

Mansoureh Labbafniya; Shahram Etemadi Borujeni; Roghaye Saeidi

Volume 13, Issue 1 , Winter and Spring 2021, Pages 47-57

http://dx.doi.org/10.22042/isecure.2020.215265.510

Abstract
   Nowadays the security of the design is so important because of the different available attacks to the system. the main aim of this paper is to improve the security of the circuit design implemented on FPGA device. Two approaches are proposed for this purpose. The first is to fill out empty space ...  Read More

Research Article
5. An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery

Salome James; Gowri Thumbur; P.Vasudeva Reddy

Volume 13, Issue 1 , Winter and Spring 2021, Pages 59-72

http://dx.doi.org/10.22042/isecure.2020.208473.495

Abstract
  In recent years, due to their potential applications, proxy blind signatures became an active research topic and are an extension of the basic proxy signature. A proxy blind signature scheme enables a proxy signer to produce a blind signature on behalf of an original signer. Such schemes are useful in ...  Read More

Research Article
6. Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case

Vahid Chegeni; Hamid Haj Seyyed Javadi; Mohammad Reza Moazami Goudarzi; Afshin Rezakhani

Volume 13, Issue 1 , Winter and Spring 2021, Pages 73-85

http://dx.doi.org/10.22042/isecure.2020.226400.535

Abstract
  Today, the Internet of Things (IoT) is one of the emerging technologies that enable the connection and transfer of information through communication networks. The main idea of the IoT is the widespread presence of objects such as mobile devices, sensors, and RFID. With the increase in traffic volume ...  Read More

Keywords Cloud