Journal: ISeCure

Volume 15, Issue 1

1 -- 58Suryateja S. Pericherla. Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art
59 -- 71Hayyan Hasan, Hasan Deeb, Behrouz Tork Ladani. A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware
73 -- 81Omid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi. Hierarchical Deterministic Wallets for Secure Steganography in Blockchain
83 -- 95Ali Khosravi, Taraneh Eghlidos. Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm
97 -- 110Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh. Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT
111 -- 124Mahdi Sajadieh, Arash Mirzaei. 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices
125 -- 135Mohammad Ebrahim Ebrahimi Kiasari, Nasrollah Pakniat, Abdolrasoul Mirghadri, Mojtaba Nazari. A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem
137 -- 151Bahram Rashidi. Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers