Journal: ISeCure

Volume 14, Issue 3

1 -- 8Amir Ashtari, Ahmad Shabani, Bijan Alizadeh. Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices
9 -- 19Navid Vafaei, Maryam Porkar, Hamed Ramzanipour, Nasour Bagheri. Practical Differential Fault Analysis on SKINNY
21 -- 31Hamed Ramzanipour, Navid Vafaei, Nasour Bagheri. Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher
33 -- 42Seyed Salar Ghazi, Haleh Amintoosi, Sahar Pilevar Moakhar. On the Suitability of Improved TrustChain for Smartphones
43 -- 49Mohammad Ali 0003. Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems
51 -- 60Fatemeh Deldar, Mahdi Abadi, Mohammad Ebrahimifard. Android Malware Detection Using One-Class Graph Neural Networks
61 -- 69Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani. Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System
71 -- 80Hadi Aghaee, Bahareh Akhbari. One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel
81 -- 92Somayeh Mozafari, Amir Jalaly Bidgoly. Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach
93 -- 99Muhamadali Hajisoltani, Raziyeh Salarifard, Hadi Soleimany. Secure and Low-Area Implementation of the AES Using FPGA
101 -- 112Afshin Karampour, Maede Ashouri-Talouki, Behrouz Tork Ladani. Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks
113 -- 121Maryam Saeedi Sadr, Mohammad Ali Hadavi. SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud
123 -- 133Sepehr Damavandi, Sadegh Dorri Nogoorani. An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs
135 -- 149Sajjad Palanki, Alireza Shafieinejad. Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage

Volume 14, Issue 2

115 -- 130Hajar Dastanpour, Ali Fanian. A Graph-based Online Feature Selection to Improve Detection of New Attacks
131 -- 145Mojtaba Hemmati, Mohammad Ali Hadavi. Bypassing Web Application Firewalls Using Deep Reinforcement Learning
147 -- 156Faeze Rasouli, Mohammad Taheri. Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code
157 -- 165Hamid Amiryousefi, Zahra Ahmadian. Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols
167 -- 179Vajiheh Sabeti, Mahsa Amerehei. Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm
181 -- 192Farnoush Manavi, Ali Hamzeh. Ransomware Detection Based on PE Header Using Convolutional Neural Networks
193 -- 213Parvin Rastegari. Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS
215 -- 227Zeinab Salami, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Hoda Jannati. Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network

Volume 14, Issue 1

1 -- 11Hossein Oraei, Massoud Hadian Dehkordi. A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes
13 -- 25Seyed Behnam Andarzian, Behrouz Tork Ladani. SANT: Static Analysis of Native Threads for Security Vetting of Android Applications
27 -- 46Mohammad Erfan Mazaheri, Siavash Bayat Sarmadi, Farhad Taheri Ardakani. A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly
47 -- 55Farshideh Kordi, Hamed Hossein-Talaee, Ali Jahanian 0001. A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack
57 -- 68Mahdieh Ebrahimi, Majid Bayat, Behnam Zahednejad. A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems
69 -- 82Saeed Banaeian Far, Maryam Rajabzadeh Assar. An Efficient Pairing-Free Identity-Based Certificateless Signcryption
83 -- 104Mitra Alidoosti, Alireza Nowroozi, Ahmad Nickabadi. Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer
105 -- 113Mahdieh Abazar, Peyman Masjedi, Mohammad Taheri. A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis