Journal: ISeCure

Volume 8, Issue 2

91 -- 92Mohammad Reza Aref. Editorial
93 -- 104Sharareh Zamanzadeh, Ali Jahanian 0001. ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
105 -- 114Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni. Traceability improvements of a new RFID protocol based on EPC C1 G2
115 -- 130Taha Yasin Rezapour, Reza Ebrahimi Atani, Meer Soheil Abolghasemi. A novel key management scheme for heterogeneous sensor networks based on the position of nodes
131 -- 139Nematollah Zarmehi, Mohammad Reza Aref. Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling
141 -- 153Ali Sedaghatbaf, Mohammad Abdollahi Azgomi. Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
155 -- 160Masoumeh Safkhani, Nasour Bagheri. A note on the security of two improved RFID protocols