Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)

 

Facts & Figures

Publication starting date

 2009

h-index

 15

i10-index

 27

Citations

856

Issue per year

3

No. of volumes

13

No. of issues

 27

No. of articles

 228

PDF Download

 748,603

View Per Article

 4168.63

PDF Download Per Article

 3283.35

Acceptance Rate

17

Accept Date (Days)

186

Number of Indexing Databases

14

 

 

The ISC International Journal of Information Security (ISeCureis a peer reviewed scholarly publication by Iranian Society of Cryptology. ISeCure is published biannually in print and online with full texts of articles made available for free on the website of the journal under ISeCure open access policy. ISeCure is devoted to publishing theoretical scholarship on a variety of topics related to information security. The intended audience of the journal is any person with an interest in information security from an academic perspective such as engineers, mathematicians and computer scientists. A partial list of topics for review by the journal can be found in the Aims and Scope section. Manuscript types for submission are research papers, review papers, case reports, short communications and letters to the editor.  More information about the policies of the journal can be found on the About Journal and mostly in the Publication Ethics pages. To start a new submission, please first read the Guide for Authors page for detailed information about manuscript format, style and other requirements. Manuscript submission, refereeing and publishing are completely free of charge. New manuscripts should be submitted online by the corresponding author through the website after registration. Articles published in ISeCure Journal are indexed in the Emerging Sources Citation Index (ESCI) database of Web of Science/ISI and Scopus.

Follow us:

 

 

 

Research Article
1. OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing

K. Nalini Sujantha Bel; I.Shatheesh Sam

Volume 13, Issue 1 , Winter and Spring 2021, Pages 1-17

http://dx.doi.org/10.22042/isecure.2020.209056.497

Abstract
  A novel feature extraction algorithm using Otsu’s Threshold (OT-features) on scrambled images and the Instantaneous Clustering (IC-CBIR) approach is proposed for Content-Based Image Retrieval in cloud computing. Images are stored in the cloud in an encrypted or scrambled form to preserve the privacy ...  Read More

Research Article
2. Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets

Vahid Meraji; Hadi Soleimany

Volume 13, Issue 1 , Winter and Spring 2021, Pages 19-27

http://dx.doi.org/10.22042/isecure.2020.209945.500

Abstract
  Numerous studies have been conducted to present new attacks using the time difference between the processor access to main memory and cache memory. Access-driven attacks are a series of cache-based attacks using fewer measurement samples to extract sensitive key values due to the ability of the attacker ...  Read More

Research Article
3. A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration

Nastaran Shekofte; Siavash Bayat Sarmadi; hatameh Mosanaei Boorani

Volume 13, Issue 1 , Winter and Spring 2021, Pages 29-45

http://dx.doi.org/10.22042/isecure.2020.196541.477

Abstract
  ‎Hardware Trojans have emerged as a major concern for integrated circuits in recent years‎. ‎As a result‎, ‎detecting Trojans has become an important issue in critical applications‎, ‎such as finance and health‎. ‎The Trojan detection methods are mainly categorized ...  Read More

Research Article
4. Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing

Mansoureh Labbafniya; Shahram Etemadi Borujeni; Roghaye Saeidi

Volume 13, Issue 1 , Winter and Spring 2021, Pages 47-57

http://dx.doi.org/10.22042/isecure.2020.215265.510

Abstract
   Nowadays the security of the design is so important because of the different available attacks to the system. the main aim of this paper is to improve the security of the circuit design implemented on FPGA device. Two approaches are proposed for this purpose. The first is to fill out empty space ...  Read More

Research Article
5. An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery

Salome James; Gowri Thumbur; P.Vasudeva Reddy

Volume 13, Issue 1 , Winter and Spring 2021, Pages 59-72

http://dx.doi.org/10.22042/isecure.2020.208473.495

Abstract
  In recent years, due to their potential applications, proxy blind signatures became an active research topic and are an extension of the basic proxy signature. A proxy blind signature scheme enables a proxy signer to produce a blind signature on behalf of an original signer. Such schemes are useful in ...  Read More

Research Article
6. Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case

Vahid Chegeni; Hamid Haj Seyyed Javadi; Mohammad Reza Moazami Goudarzi; Afshin Rezakhani

Volume 13, Issue 1 , Winter and Spring 2021, Pages 73-85

http://dx.doi.org/10.22042/isecure.2020.226400.535

Abstract
  Today, the Internet of Things (IoT) is one of the emerging technologies that enable the connection and transfer of information through communication networks. The main idea of the IoT is the widespread presence of objects such as mobile devices, sensors, and RFID. With the increase in traffic volume ...  Read More

Research Article
1. Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud

Aniseh Najafi; Majid Bayat; Hamid Haj Seyyed Javadi

Articles in Press, Accepted Manuscript, Available Online from 08 May 2021

http://dx.doi.org/10.22042/isecure.2021.227562.542

Abstract
  The advent of cloud computing in the healthcare system makes accuracy and speed increased, costs reduced, and health services widely used. However, system users are always seriously concerned about the security of outsourced data. The ciphertext-policy attribute-based encryption (CP-ABE) is a promising ...  Read More

Research Article
2. File Fragment Type Classification by Bag-Of-Visual-Words

Mina Erfan; Saeed Jalili

Articles in Press, Accepted Manuscript, Available Online from 08 May 2021

http://dx.doi.org/10.22042/isecure.2021.243876.570

Abstract
  File fragments’ type classification in the absence of header and file system information, is a major building block in various solutions devoted to file carving, memory analysis and network forensics. Over the past decades, a substantial amount of effort has been put into developing methods to ...  Read More

Research Article
3. IDOT: Black-box Detection of Access Control Violations in Web Applications

Mohammad Ali Hadavi; Arash Bagherdaei; Simin Ghasemi

Articles in Press, Accepted Manuscript, Available Online from 26 June 2021

http://dx.doi.org/10.22042/isecure.2021.254089.580

Abstract
  Automatic detection of access control violations in software applications is a challenging problem. Insecure Direct Object Reference (IDOR) is among top-ranked vulnerabilities, which violates access control policies and cannot be yet detected by automated vulnerability scanners. While such tools may ...  Read More

Research Article
4. Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware

Hayyan Hasan; Behrouz Tork Ladani; Bahman Zamani

Articles in Press, Accepted Manuscript, Available Online from 12 June 2021

http://dx.doi.org/10.22042/isecure.2021.262208.589

Abstract
  Dynamic analysis is a prominent approach in analyzing the behavior of Android apps. To perform dynamic analysis, we need an event generator to provide proper environment for executing the app in an emulator. Monkey is the most popular event generator for Android apps in general, and is used in dynamic ...  Read More

Research Article
5. Blind Multipurpose Image Watermarking with Perfect Security

Sorour Sheidani; Ziba Eslami

Articles in Press, Accepted Manuscript, Available Online from 29 May 2021

http://dx.doi.org/10.22042/isecure.2021.223025.527

Abstract
  Nowadays, from one hand multimedia authentication techniques are widely used to achieve trustworthiness, on the other hand, due to the rapid growth of image processing software technologies, having a secure method to protect the copyright of these data seems fairly essential. Multipurpose watermarking ...  Read More

Short Paper
6. An Obfuscation Method Based on CFGLUTs for Security of FPGAs

Mansoureh Labafniya; Shahram Etemadi Borujeni

Articles in Press, Accepted Manuscript, Available Online from 19 June 2021

http://dx.doi.org/10.22042/isecure.2021.234848.557

Abstract
  There are many different ways of securing FPGAs to prevent successful reverse engineering. One of the common forms is obfuscation methods. In this paper, we proposed an approach based on obfuscation to prevent FPGAs from successful reverse engineering and, as a result, Hardware Trojan Horses (HTHs) insertion. ...  Read More

Research Article
7. Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks

Milad Salimian; Ali Jahanian

Articles in Press, Accepted Manuscript, Available Online from 26 June 2021

http://dx.doi.org/10.22042/isecure.2021.262549.591

Abstract
  Side-channel analysis methods can reveal the secret information of digital electronic systems by analyzing the dependency between the power consumption of implemented cryptographic algorithms and the secret data. Recent studies show that it is possible to gather information about power consumption from ...  Read More

Research Article
8. Provable building-blocks for designing BKZ-simulation

Gholam Reza Moghissi; Ali Payandeh

Articles in Press, Accepted Manuscript, Available Online from 26 June 2021

http://dx.doi.org/10.22042/isecure.2021.225886.531

Abstract
  The Blockwise-Korkine-Zolotarev (BKZ) algorithm has the main role in most lattice-based attacks, so the total cost and output quality of this algorithm should be computed exactly and used in parameter selection of lattice-based cryptographic primitives. Since the exact manner of BKZ for higher block ...  Read More

Keywords Cloud