Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)

 

Facts & Figures

Publication starting date

 2009

h-index

 14

i10-index

 18

Citations

 665

Issue per year

3

No. of volumes

12

No. of issues

 24

No. of articles

 196

PDF Download

 731,461

View Per Article

 4719.81

PDF Download Per Article

 3731.94

Acceptance Rate

14

Accept Date (Days)

186

Number of Indexing Databases

16

 

 

The ISC International Journal of Information Security (ISeCureis a peer reviewed scholarly publication by Iranian Society of Cryptology. ISeCure is published biannually in print and online with full texts of articles made available for free on the website of the journal under ISeCure open access policy. ISeCure is devoted to publishing theoretical scholarship on a variety of topics related to information security. The intended audience of the journal is any person with an interest in information security from an academic perspective such as engineers, mathematicians and computer scientists. A partial list of topics for review by the journal can be found in the Aims and Scope section. Manuscript types for submission are research papers, review papers, case reports, short communications and letters to the editor.  More information about the policies of the journal can be found on the About Journal and mostly in the Publication Ethics pages. To start a new submission, please first read the Guide for Authors page for detailed information about manuscript format, style and other requirements. Manuscript submission, refereeing and publishing are completely free of charge. New manuscripts should be submitted online by the corresponding author through the website after registration. Articles published in ISeCure Journal are indexed in the Emerging Sources Citation Index (ESCI) database of Web of Science/ISI.

Follow us:

 

 

 

ORIGINAL RESEARCH PAPER
1. Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher

Zahra Eskandari; Abbas Ghaemi Bafghi

Volume 12, Issue 1 , Winter and Spring 2020, Pages 1-12

http://dx.doi.org/10.22042/isecure.2020.199304.481

Abstract
  Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated ...  Read More

ORIGINAL RESEARCH PAPER
2. Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

Majid Mahmoudzadeh Niknam; Sadegh Sadeghi; Mohammad Reza Aref; Nasour Bagheri

Volume 12, Issue 1 , Winter and Spring 2020, Pages 13-23

http://dx.doi.org/10.22042/isecure.2020.199099.480

Abstract
  In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. ...  Read More

ORIGINAL RESEARCH PAPER
3. New High Secure Network Steganography Method Based on Packet Length

Vajiheh Sabeti; Minoo Shoaei

Volume 12, Issue 1 , Winter and Spring 2020, Pages 24-44

http://dx.doi.org/10.22042/isecure.2020.194573.475

Abstract
  In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has ...  Read More

ORIGINAL RESEARCH PAPER
4. Improved Univariate Microaggregation for Integer Values

Reza Mortazavi

Volume 12, Issue 1 , Winter and Spring 2020, Pages 35-43

http://dx.doi.org/10.22042/isecure.2019.185397.465

Abstract
  Privacy issues during data publishing is an increasing concern of involved entities. The problem is addressed in the field of statistical disclosure control with the aim of producing protected datasets that are also useful for interested end users such as government agencies and research communities. ...  Read More

ORIGINAL RESEARCH PAPER
5. Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Shahriar Mohammadi; Amin Namadchian

Volume 12, Issue 1 , Winter and Spring 2020, Pages 44-54

http://dx.doi.org/10.22042/isecure.2020.199009.479

Abstract
  Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are ...  Read More

ORIGINAL RESEARCH PAPER
6. Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption

Bashir Naderi; Hossein Kheiri; Vajiheh Vafaei

Volume 12, Issue 1 , Winter and Spring 2020, Pages 55-66

http://dx.doi.org/10.22042/isecure.2019.156417.439

Abstract
  In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply ...  Read More

ORIGINAL RESEARCH PAPER
1. CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Mohsen Jahanbani; Nasour Bagheri; Zynolabedin Norozi

Articles in Press, Accepted Manuscript, Available Online from 11 July 2020

http://dx.doi.org/10.22042/isecure.2020.191916.471

Abstract
  Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical ...  Read More

ORIGINAL RESEARCH PAPER
2. A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions

Ali Zaghian; Bagher Bagherpour

Articles in Press, Accepted Manuscript, Available Online from 11 July 2020

http://dx.doi.org/10.22042/isecure.2020.212763.505

Abstract
  A non-interactive (t,n)-publicly veri able secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS ...  Read More

ORIGINAL RESEARCH PAPER
3. GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Mohammad Mahdi Modiri; Javad Mohajeri; Mahmoud Salmasizadeh

Articles in Press, Accepted Manuscript, Available Online from 31 May 2020

http://dx.doi.org/10.22042/isecure.2020.213482.507

Abstract
  Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling ...  Read More

ORIGINAL RESEARCH PAPER
4. F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management

Mahsa Nooribakhsh; Mahdi Mollamotalebi

Articles in Press, Accepted Manuscript, Available Online from 31 May 2020

http://dx.doi.org/10.22042/isecure.2020.167450.453

Abstract
  Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric ...  Read More

ORIGINAL RESEARCH PAPER
5. Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Maryam Zarezadeh; Maede Ashouri-Talouki; Mohammad Siavashi

Articles in Press, Accepted Manuscript, Available Online from 31 May 2020

http://dx.doi.org/10.22042/isecure.2020.174338.458

Abstract
  Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha ...  Read More

Keywords Cloud