Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)

 

Facts & Figures

Publication starting date

 2009

h-index

 15

i10-index

 20

Citations

 749

Issue per year

3

No. of volumes

12

No. of issues

 25

No. of articles

 199

PDF Download

 735,224

View Per Article

 4673.74

PDF Download Per Article

 3694.59

Acceptance Rate

14

Accept Date (Days)

188

Number of Indexing Databases

16

 

 

The ISC International Journal of Information Security (ISeCureis a peer reviewed scholarly publication by Iranian Society of Cryptology. ISeCure is published biannually in print and online with full texts of articles made available for free on the website of the journal under ISeCure open access policy. ISeCure is devoted to publishing theoretical scholarship on a variety of topics related to information security. The intended audience of the journal is any person with an interest in information security from an academic perspective such as engineers, mathematicians and computer scientists. A partial list of topics for review by the journal can be found in the Aims and Scope section. Manuscript types for submission are research papers, review papers, case reports, short communications and letters to the editor.  More information about the policies of the journal can be found on the About Journal and mostly in the Publication Ethics pages. To start a new submission, please first read the Guide for Authors page for detailed information about manuscript format, style and other requirements. Manuscript submission, refereeing and publishing are completely free of charge. New manuscripts should be submitted online by the corresponding author through the website after registration. Articles published in ISeCure Journal are indexed in the Emerging Sources Citation Index (ESCI) database of Web of Science/ISI.

Follow us:

 

 

 

ORIGINAL RESEARCH PAPER
1. CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Mohsen Jahanbani; Nasour Bagheri; Zynolabedin Norozi

Volume 12, Issue 2 , Summer and Autumn 2020, Pages 67-80

http://dx.doi.org/10.22042/isecure.2020.191916.471

Abstract
  Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical ...  Read More

ORIGINAL RESEARCH PAPER
2. Enhanced Flush+Reload Attack on AES

Milad Seddigh; Hadi Soleimany

Volume 12, Issue 2 , Summer and Autumn 2020, Pages 81-89

http://dx.doi.org/10.22042/isecure.2020.219248.519

Abstract
  In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used ...  Read More

ORIGINAL RESEARCH PAPER
3. A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions

Ali Zaghian; Bagher Bagherpour

Volume 12, Issue 2 , Summer and Autumn 2020, Pages 91-99

http://dx.doi.org/10.22042/isecure.2020.212763.505

Abstract
  A non-interactive (t,n)-publicly veri able secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS ...  Read More

ORIGINAL RESEARCH PAPER
4. GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Mohammad Mahdi Modiri; Javad Mohajeri; Mahmoud Salmasizadeh

Volume 12, Issue 2 , Summer and Autumn 2020, Pages 101-111

http://dx.doi.org/10.22042/isecure.2020.213482.507

Abstract
  Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling ...  Read More

ORIGINAL RESEARCH PAPER
5. F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Mahsa Nooribakhsh; Mahdi Mollamotalebi

Volume 12, Issue 2 , Summer and Autumn 2020, Pages 113-128

http://dx.doi.org/10.22042/isecure.2020.167450.453

Abstract
  Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric ...  Read More

ORIGINAL RESEARCH PAPER
6. Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Maryam Zarezadeh; Maede Ashouri-Talouki; Mohammad Siavashi

Volume 12, Issue 2 , Summer and Autumn 2020, Pages 129-140

http://dx.doi.org/10.22042/isecure.2020.174338.458

Abstract
  Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha ...  Read More

ORIGINAL RESEARCH PAPER
1. Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets

Vahid Meraji; Hadi Soleimany

Articles in Press, Accepted Manuscript, Available Online from 05 September 2020

http://dx.doi.org/10.22042/isecure.2020.209945.500

Abstract
  Numerous studies have been conducted to present new attacks using the time difference between the processor access to main memory and cache memory. Access-driven attacks are a series of cache-based attacks using fewer measurement samples to extract sensitive key values due to the ability of the attacker ...  Read More

Keywords Cloud