Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)


Facts & Figures

Publication starting date








Issue per year


No. of volumes


No. of issues


No. of articles


PDF Download


View Per Article


PDF Download Per Article


Acceptance Rate


Accept Date (Days)


Number of Indexing Databases




The ISC International Journal of Information Security (ISeCureis a peer reviewed scholarly publication by Iranian Society of Cryptology. ISeCure is published biannually in print and online with full texts of articles made available for free on the website of the journal under ISeCure open access policy. ISeCure is devoted to publishing theoretical scholarship on a variety of topics related to information security. The intended audience of the journal is any person with an interest in information security from an academic perspective such as engineers, mathematicians and computer scientists. A partial list of topics for review by the journal can be found in the Aims and Scope section. Manuscript types for submission are research papers, review papers, case reports, short communications and letters to the editor.  More information about the policies of the journal can be found on the About Journal and mostly in the Publication Ethics pages. To start a new submission, please first read the Guide for Authors page for detailed information about manuscript format, style and other requirements. Manuscript submission, refereeing and publishing are completely free of charge. New manuscripts should be submitted online by the corresponding author through the website after registration. Articles published in ISeCure Journal are indexed in the Emerging Sources Citation Index (ESCI) database of Web of Science/ISI and Scopus.

Follow us:




Research Article
1. Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud

Aniseh Najafi; Majid Bayat; Hamid Haj Seyyed Javadi

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 87-100


  The advent of cloud computing in the healthcare system makes accuracy and speed increased, costs reduced, and health services widely used. However, system users are always seriously concerned about the security of outsourced data. The ciphertext-policy attribute-based encryption (CP-ABE) is a promising ...  Read More

Research Article
2. File Fragment Type Classification by Bag-Of-Visual-Words

Mina Erfan; Saeed Jalili

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 101-116


  File fragments’ type classification in the absence of header and file system information, is a major building block in various solutions devoted to file carving, memory analysis and network forensics. Over the past decades, a substantial amount of effort has been put into developing methods to ...  Read More

Research Article
3. IDOT: Black-Box Detection of Access Control Violations in Web Applications

Mohammad Ali Hadavi; Arash Bagherdaei; Simin Ghasemi

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 117-129

  < p>Automatic detection of access control violations in software applications is a challenging problem. Insecure Direct Object Reference (IDOR) is among top-ranked vulnerabilities, which violates access control policies and cannot be yet detected by automated vulnerability scanners. While such ...  Read More

Research Article
4. Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware

Hayyan Hasan; Behrouz Tork Ladani; Bahman Zamani

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 131-143


  Dynamic analysis is a prominent approach in analyzing the behavior of Android apps. To perform dynamic analysis, we need an event generator to provide proper environment for executing the app in an emulator. Monkey is the most popular event generator for Android apps in general, and is used in dynamic ...  Read More

Research Article
5. Blind Multipurpose Image Watermarking with Perfect Security

Sorour Sheidani; Ziba Eslami

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 145-156


  Nowadays, from one hand multimedia authentication techniques are widely used to achieve trustworthiness, on the other hand, due to the rapid growth of image processing software technologies, having a secure method to protect the copyright of these data seems fairly essential. Multipurpose watermarking ...  Read More

Short Paper
6. An Obfuscation Method Based on CFGLUTs for Security of FPGAs

Mansoureh Labafniya; Shahram Etemadi Borujeni

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 157-162


  There are many different ways of securing FPGAs to prevent successful reverse engineering. One of the common forms is obfuscation methods. In this paper, we proposed an approach based on obfuscation to prevent FPGAs from successful reverse engineering and, as a result, Hardware Trojan Horses (HTHs) insertion. ...  Read More

Research Article
7. Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks

Milad Salimian; Ali Jahanian

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 163-176


  Side-channel analysis methods can reveal the secret information of digital electronic systems by analyzing the dependency between the power consumption of implemented cryptographic algorithms and the secret data. Recent studies show that it is possible to gather information about power consumption from ...  Read More

Research Article
8. Better Sampling Method of Enumeration Solution for BKZ-Simulation

Gholam Reza Moghissi; Ali Payandeh

Volume 13, Issue 2 , Summer and Autumn 2021, Pages 177-208


  The exact manner of BKZ algorithm for higher block sizes cannot be studied by practical running, so simulation of BKZ can be used to predict the total cost and output quality of BKZ algorithm. Sampling method of enumeration solution vector v is one of the main components of designing BKZ-simulation and ...  Read More

Research Article
1. A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes

Hossein Oraei; Massoud Hadian

Articles in Press, Accepted Manuscript, Available Online from 06 September 2021


  Digital signature schemes are used to guarantee for non-repudiation and authenticity of any kind of data like documents, messages or software. The Winternitz one-time signature (WOTS) scheme, which can be described using a certain number of so-called function chains, plays an important role in the designof ...  Read More

Research Article
2. SANT: Static Analysis of Native Threads for Security Vetting of Android Applications

Seyed Behnam Andarzian; Behrouz Tork Ladani

Articles in Press, Accepted Manuscript, Available Online from 05 September 2021


  Most of the current research on static analysis of Android applications for security vetting either work on Java source code or the Dalvik bytecode. Nevertheless, Android allows developers to use C or C++ code in their programs that is compiled into various binary architectures. Moreover, Java and the ...  Read More

Research Article
3. Ransomware Detection Based on PE Header Using Convolutional Neural Networks

Farnoush Manavi; Ali Hamzeh

Articles in Press, Accepted Manuscript, Available Online from 28 August 2021


  With the spread of information technology in human life, data protection is a critical task. On the other hand, malicious programs are developed, which can manipulate sensitive and critical data and restrict access to this data. Ransomware is an example of such a malicious program that encrypts data, ...  Read More

Research Article
4. A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly

Mohammad Erfan Mazaheri; Siavash Bayat Sarmadi; Farhad Taheri Ardakani

Articles in Press, Accepted Manuscript, Available Online from 06 September 2021


  Side-channel attacks are a group of powerful attacks in hardware security that exploit the deficiencies in the implementation of systems. Timing side-channel attacks are one of the main side-channel attack categories that use the time difference of running an operation in different states. Many powerful ...  Read More

Technical Paper
5. A Time Randomization based Countermeasure against the Template Side Channel Attack

Farshideh Kordi; Hamed Hosseintalaee; Ali Jahanian

Articles in Press, Accepted Manuscript, Available Online from 06 September 2021


  The template attack is one of the most efficient attacks for exploiting the secret key. Template-based attack extracts a model forthe behavior of side channel information from a device which is similar to the target device and then uses this model to retrievethe correct key on the target victim device. ...  Read More

Research Article
6. A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems

Mahdieh Ebrahimi; Majid Bayat; Behnam Zahednejad

Articles in Press, Accepted Manuscript, Available Online from 28 August 2021


  The medical system remains among the fastest to adopt the Internet of Things. The reason for this trend is that integration Internet of Things(IoT) features into medical devices greatly improve the quality and effectiveness of service. However, there are many unsolved security problems. Due to medical ...  Read More

Research Article
7. An Efficient Pairing-Free Identity-Based Certificateless Signcryption

Saeed Banaeian Far; Maryam Rajabzadeh Assar

Articles in Press, Accepted Manuscript, Available Online from 28 August 2021


  A certificateless (CL) signcryption scheme is a cryptographic primitive that provides user authentication and message confidentiality at the same time. CL signcryption schemes (as a type of certificateless encryption scheme) have solved problems concerning malicious server presentation, and the server ...  Read More

Research Article
8. Business-Layer Session Puzzling Racer: Dynamic Security Testing against Session Puzzling Race Conditions in the Business Layer

Mitra Alidoosti; Alireza Nowroozi; Ahmad Nickabadi

Articles in Press, Accepted Manuscript, Available Online from 06 September 2021


  Parallel execution of multiple threads of a web application will result in server-side races if the web application is not synchronized correctly. Server-side race is susceptible to flaws in the relation between the server and the database. Detecting the race condition in the web applications depends ...  Read More

Research Article
9. A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis

Mahdieh Abazar; Peyman Masjedi; Mohammad Taheri

Articles in Press, Accepted Manuscript, Available Online from 06 September 2021


  Steganalysis is an interesting classification problem to discriminate the images, including hidden messages from the clean ones. There are many methods, including deep CNN networks, to extract fine features for this classification task. Also, some researches have been conducted to improve the final classifier. ...  Read More

Keywords Cloud