Journal: ISeCure

Volume 16, Issue 2

115 -- 136Fatemeh Pirmoradian, Mohammad Dakhilalian, Masoumeh Safkhani. ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS
137 -- 147Mohammad Ali Jamshidi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref. Customizable Utility-Privacy Trade-Off: A Flexible Autoencoder-Based Obfuscator
149 -- 163Maryam Rajabzadeh Asaar, Mustafa Isam Ahmed Al-Baghdadi. Security Enhancement of an Authentication Scheme Based on DAC and Intel SGX in WSNs
165 -- 190Kostyantyn Anatolievich Malyshenko, Majid Mohammad Shafiee, Vadim Anatolievich Malyshenko. Identification of Fake News Using Emotional Profiling as an Approach to Text Analysis
191 -- 203Mehmet Emin Gönen, Muhammed Said Gündogan, Kamil Otal. Boomerang Attacks on Reduced-Round Midori64
205 -- 220Nilakshi Gogoi, Dhruba K. Bhattacharyya, Debojit Boro. Shrew DDoS Attack Detection Based on Statistical Analysis