Journal of Computing and Security


JCS is an openly accessible and peer-reviewed journal

Editor in Chief: Dr. Ahmad Reza Naghsh Nilchi

Managing Editor: Dr. Behrouz Tork Ladani

ISSN Print: 2322-4460

ISSN Online: 2383-0417



Paper Submission


NEW >> Special Issue Call for Papers - Future Internet: Architectures and Applications


Journal of Computing and Security (JCS) is a peer-reviewed, scientific journal that is committed to publication of original results in all areas of modern computing as well as information security. We are pleased to invite you to submit your original article(s), which is neither previously published nor under consideration for review or publication elsewhere. The notification of acceptance is sent in at most four months period from the date of submission to expedite the publication process. The published issues are in English and distributed worldwide in open access fashion.


Aims and Scope

JCS is dedicated to the publication of quality research papers in the area of information technology and computer science and engineering with the focus on the following topics:

Modern Computing

Information Security


Artificial Intelligence

Computer Graphics and Multimedia

Computer Modeling and Simulation

Computer Networks

Data Mining

Databases and Semantic Web

Digital Image and Speech Processing

e-Business and Internet Applications

Formal Methods

Hardware Design and Simulation

High Performance Computing and Distributed Systems

Intelligent Robotics

Neural Networks and Fuzzy logic

Pattern Recognition

Software Engineering

Symbolic Computation

Theory of Computing

Wireless Communications and Ad Hoc Networks

Authentication and Access Control


Cryptographic Algorithms

Formal and Provable Security Analysis

Information Warfare and Survivability

Internet Applications Security

Intrusion Detection

Mathematics of Cryptology

Network and Communication Security

OS and Database Security

Privacy and Anonymity

Security in Pervasive Computing

Security Protocols

Software Security

Steganography and Watermarking

Trust Modeling

Vulnerability and Risk Management

Paper Submission

To expedite the publication process and reduce the formatting related tasks for our contributors, the initial submitted papers could be in word or PDF formats. Authors may also use IEEE, Springer or ACM templates. Paper(s) must, however, be written in English. For submission, you should first register in the editorial system from here. I you have already registered please login and then select the new submission link.

Contact Info



Tel: +98 311 7934558+98 31 37934558

Fax: +98 31 37932670

Vol 3, No 1 (2016): January 2016

Table of Contents

Peer-reviewed Articles

A CCA2-Secure Incomparable Public Key Encryption Scheme PDF PERSIAN_ABS
Bahman Rajabi, Ziba Eslami
A Novel Block Cipher Algorithm with Feistel-Like Structure PDF PERSIAN_ABS
Mahmood Deypir, Yousef Purebrahim
Multiple-Fault Tolerant Hardware Structure for Cellular Genetic Algorithm PDF PERSIAN_ABS
Peyman Ashooriyan, Yasser Baleghi Damavandi
Structural and Non-Structural Similarity Combination of Users in Social Networks PDF PERSIAN_ABS
Azam Malekmohammad, Hadi Khosravi
Enhancing the Sense of Immersion and Quality of Experience in Mobile Games Using Augmented Reality PDF PERSIAN_ABS
Yoones A Sekhavat, Hosein Zarei
Determining the Number of Accusations for Decision Making in Key Revocation Protocol for MANET PDF PERSIAN_ABS
Maryam Zarezadeh, Mohammad Ali Doostari, Seyyed Hamid Haj Seyyed Javadi

ISSN: 2383-0417