Journal: ISeCure

Volume 14, Issue 3

1 -- 8Amir Ashtari, Ahmad Shabani, Bijan Alizadeh. Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices
9 -- 19Navid Vafaei, Maryam Porkar, Hamed Ramzanipour, Nasour Bagheri. Practical Differential Fault Analysis on SKINNY
21 -- 31Hamed Ramzanipour, Navid Vafaei, Nasour Bagheri. Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher
33 -- 42Seyed Salar Ghazi, Haleh Amintoosi, Sahar Pilevar Moakhar. On the Suitability of Improved TrustChain for Smartphones
43 -- 49Mohammad Ali 0003. Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems
51 -- 60Fatemeh Deldar, Mahdi Abadi, Mohammad Ebrahimifard. Android Malware Detection Using One-Class Graph Neural Networks
61 -- 69Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani. Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System
71 -- 80Hadi Aghaee, Bahareh Akhbari. One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel
81 -- 92Somayeh Mozafari, Amir Jalaly Bidgoly. Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach
93 -- 99Muhamadali Hajisoltani, Raziyeh Salarifard, Hadi Soleimany. Secure and Low-Area Implementation of the AES Using FPGA
101 -- 112Afshin Karampour, Maede Ashouri-Talouki, Behrouz Tork Ladani. Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks
113 -- 121Maryam Saeedi Sadr, Mohammad Ali Hadavi. SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud
123 -- 133Sepehr Damavandi, Sadegh Dorri Nogoorani. An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs
135 -- 149Sajjad Palanki, Alireza Shafieinejad. Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage