Journal: ISeCure

Volume 8, Issue 1

1 -- 2Mohammad Reza Aref. Editorial
3 -- 24Mohsen Pourpouneh, Rasoul Ramezanian. A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
25 -- 38Hamidreza Amini Khorasgani, Saba Asaad, Hossein Pilaram, Taraneh Eghlidos, Mohammad Reza Aref. On the design and security of a lattice-based threshold secret sharing scheme
39 -- 52Farzane Aminmansour, Hamid Reza Shahriari. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture
53 -- 60Sharareh Zamanzadeh, Ali Jahanian 0001. Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose
61 -- 71Meisam Kamarei, Ahmad Patooghy, Mahdi Fazeli. Unauthenticated event detection in wireless sensor networks using sensors co-coverage
73 -- 84Akram Khalesi, Hossein Bahramgiri, Davod Mansuri. A new method for accelerating impossible differential cryptanalysis and its application on LBlock