Journal: ISeCure

Volume 6, Issue 1

1 -- 2Rasool Jalili. Editorial
3 -- 22Saeed Shokrollahi, Fereidoon Shams, Javad Esmaeili. Access control in ultra-large-scale systems using a data-centric middleware
23 -- 34Shahram Rasoolzadeh, Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref. Total break of Zorro using linear and differential attacks
35 -- 52Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi. A centralized privacy-preserving framework for online social networks
53 -- 66Hamzeh Ghasemzadeh, Ali Payandeh, Mohammad Reza Aref. Toward an energy efficient PKC-based key management system for wireless sensor networks
67 -- 76Asghar Tavakoly, Reza Ebrahimi Atani. Improving Tor security against timing and traffic analysis attacks with fair randomization
77 -- 89Mahdieh Zabihi, Majid Vafaei Jahan, Javad Hamidzadeh. A density based clustering approach to distinguish between web robot and human requests to a web server