Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)


Facts & Figures

Publication starting date








Issue per year


No. of volumes


No. of issues


No. of articles


PDF Download


View Per Article


PDF Download Per Article


Acceptance Rate


Accept Date (Days)


Number of Indexing Databases




The ISC International Journal of Information Security (ISeCureis a peer reviewed scholarly publication by Iranian Society of Cryptology. ISeCure is published biannually in print and online with full texts of articles made available for free on the website of the journal under ISeCure open access policy. ISeCure is devoted to publishing theoretical scholarship on a variety of topics related to information security. The intended audience of the journal is any person with an interest in information security from an academic perspective such as engineers, mathematicians and computer scientists. A partial list of topics for review by the journal can be found in the Aims and Scope section. Manuscript types for submission are research papers, review papers, case reports, short communications and letters to the editor.  More information about the policies of the journal can be found on the About Journal and mostly in the Publication Ethics pages. To start a new submission, please first read the Guide for Authors page for detailed information about manuscript format, style and other requirements. Manuscript submission, refereeing and publishing are completely free of charge. New manuscripts should be submitted online by the corresponding author through the website after registration. Articles published in ISeCure Journal are indexed in the Emerging Sources Citation Index (ESCI) database of Web of Science/ISI and Scopus.

Web of Science Scopus CiteScore
SCImago Journal & Country Rank

Journal Impact Factor



Journal Citation Indicator (JCI)


2021          2022  
   Follow us:                         
0.7   0.13 0.1    0.3   


Research Article
Analysis of IOTA Tangle Stability in High Transaction Rates

Habibullah Yajam; Mohammad Ali Akhaee

Volume 15, Issue 2 , July 2023, Pages 152-162


  The future of the IoT requires new methods of payment that can handle millions of transactions per second. IOTA cryptocurrency aims at providing such a solution. It uses a consensus algorithm based on directed acyclic graphs (DAG) that is called Tangle. A tip selection algorithm (TSA) is a part of Tangle ...  Read More

Research Article
MISC: Multi-Input Secure Two-Party Computation

Farhad Taheri Ardakani; Siavash Bayat Sarmadi

Volume 15, Issue 2 , July 2023, Pages 163-177


  Secure multi-party computation (MPC) allows a group of parties to compute a function on their private inputs securely. Classic MPC protocols for two parties use either Yao's garbled circuit (GC) or the Goldreich-Micali-Wigderson (GMW) protocol. In this paper, we propose MISC, a multi-input secure computation ...  Read More

Research Article
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks

Ali Ahmadian Ramaki; Abbas Ghaemi-Bafghi; Abbas Rasoolzadegan

Volume 15, Issue 2 , July 2023, Pages 178-215


  Nowadays, targeted attacks like Advanced Persistent Threats (APTs) has become one of the major concern of many enterprise networks. As a common approach to counter these attacks, security staff deploy a variety of heterogeneous security and non-security sensors at different lines of defense (Network, ...  Read More

Research Article
Secure Outsourcing of Two Standard Identity-Based Cryptosystems

Hamid Mala; Mohammad Reza Saeidi

Volume 15, Issue 2 , July 2023, Pages 216-229


  In the last two decades bilinear pairings have found many applications in cryptography. Meanwhile identity-based cryptosystems based on bilinear pairings have received particular attention. The IEEE, IETF, and ISO organizations have been working on standardization of pairing-based cryptographic schemes. ...  Read More

Research Article
A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers

Faeze Rasouli; Mohammad Taheri; Reza Rohani Sarvestani

Volume 15, Issue 2 , July 2023, Pages 230-239


  Fragile watermarking is the task of embedding a watermark in a media (an image in this paper) such that even small changes, called tamper, can be detected or even recovered to prevent unauthorized alteration. A well-known category of spatial fragile watermarking methods is based on embedding the watermark ...  Read More

Research Article
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network

Maryam Azadmanesh; Behrouz Shahgholi Ghahfarokhi; Maede Ashouri-Talouki

Volume 15, Issue 2 , July 2023, Pages 240-253


  Using generative models to produce unlimited synthetic samples is a popular replacement for database sharing. Generative Adversarial Network (GAN) is a popular class of generative models which generates synthetic data samples very similar to real training datasets. However, GAN models do not necessarily ...  Read More

Research Article
Reverse Engineering of Authentication Protocol in DesFire

Mansoureh Labbafniya; Hamed Yusefi; Akram Khalesi

Volume 15, Issue 2 , July 2023, Pages 254-259


  Nowadays contactless smart cards are extensively used in applications that need strong authentication and security feature protection. Among different cards from different companies, MIFARE DESFire cards are one of the most used cases. The hardware and software design in addition to implementation details ...  Read More

Research Article
Oblivious Transfer Using Generalized Jacobian of Elliptic Curves

Maryam Rezaei Kashi; Mojtaba Bahramian

Volume 15, Issue 2 , July 2023, Pages 260-273


  ‎Oblivious transfer is one of the important tools in cryptography‎, ‎in which a sender sends a message to a receiver with a probability between 0 and 1‎, ‎while the sender remains oblivious that the receiver has received the message‎.‎A flavor of $OT$ schemes is chosen $t$-out-of-$k$ ...  Read More

Keywords Cloud