Journal: ISeCure

Volume 13, Issue 1

1 -- 17K. Nalini Sujantha Bel, I. Shatheesh Sam. OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing
19 -- 27Vahid Meraji, Hadi Soleimany. Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets
29 -- 45Nastaran Shekofte, Siavash Bayat Sarmadi, Hatameh Mosanaei-Boorani. A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration
47 -- 57Mansoureh Labbafniya, Shahram Etemadi Borujeni, Roghayeh Saeidi. Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing
59 -- 72Salome James, Thumbur Gowri, Punugu Vasudeva Reddy. An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery
73 -- 85Vahid Chegeni, Hamid Haj Seyyed Javadi, Mohammad Reza Moazami Goudarzi, Afshin Rezakhani. Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case