Journal: ISeCure

Volume 1, Issue 2

69 -- 70Rasool Jalili. Editorial
71 -- 90Jovan Dj. Golic. Moving dispersion method for statistical anomaly detection in intrusion detection systems
91 -- 103Ian G. Harris, Thoulfekar Alrahem, Alex Chen, Nicholas DiGiuseppe, Jefferey Gee, Shang-Pin Hsiao, Sean Mattox, Taejoon Park, Saravanan Selvaraj, Albert Tam, Marcel Carlsson. Security testing of session initiation protocol implementations
105 -- 123M. Tariq Banday, Nisar A. Shah. Image flip CAPTCHA
125 -- 131Morteza Nikooghadam, Ali Zakerolhosseini. An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Volume 1, Issue 1

1 -- 2Mohammad Reza Aref, Rasool Jalili. Editorial
3 -- 15Ali Fanian, Mehdi Berenjkoub, T. Aaron Gulliver. A TESLA-based mutual authentication protocol for GSM networks
17 -- 26Vajiheh Sabeti, Shadrokh Samavi, Mojtaba Mahdavi, Shahram Shirani. Steganalysis of embedding in difference of image pixel pairs by neural network
27 -- 34Hoi Ting Poon, Ali Miri. A collusion attack on the fuzzy vault scheme
35 -- 54Jafar Haadi Jafarian, Morteza Amini. CAMAC: a context-aware mandatory access control model
55 -- 67Rasoul Ramezanian. Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions