Journal: ISeCure

Volume 15, Issue 3

0 -- 0Parichehr Dadkhah, Mohammad Dakhilalian, Parvin Rastegari. Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks
0 -- 0Hadi Aghaee, Bahareh Akhbari. Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions
0 -- 0Amirhosein Salehi, Siavash Ahmadi, Mohammad Reza Aref. A Semi-Supervised IDS for Cyber-Physical Systems Using a Deep Learning Approach
1 -- 16Danial Shiraly, Nasrollah Pakniat, Ziba Eslami. Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting

Volume 15, Issue 2

0 -- 0Farhad Taheri Ardakani, Siavash Bayat Sarmadi. MISC: Multi-Input Secure Two-Party Computation
0 -- 0Hamid Mala, Mohammad Reza Saeidi. Secure Outsourcing of Two Standard Identity-Based Cryptosystems
0 -- 0Maryam Rezaei Kashi, Mojtaba Bahramian. Oblivious Transfer Using Generalized Jacobian of Elliptic Curves
0 -- 0Faeze Rasouli, Mohammad Taheri, Reza Rohani Sarvestani. A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers
0 -- 0Habib Allah Yajam, Mohammad Ali Akhaee. Analysis of IOTA Tangle Stability in High Transaction Rates
0 -- 0Maryam Azadmanesh, Behrouz Shahgholi Ghahfarokhi, Maede Ashouri-Talouki. An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network
0 -- 0Ali Ahmadian Ramaki, Abbas Ghaemi Bafghi, Abbas Rasoolzadegan. Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks
0 -- 0Mansoureh Labbafniya, Hamed Yusefi, Akram Khalesi. Reverse Engineering of Authentication Protocol in DesFire

Volume 15, Issue 1

1 -- 58Suryateja S. Pericherla. Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art
59 -- 71Hayyan Hasan, Hasan Deeb, Behrouz Tork Ladani. A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware
73 -- 81Omid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi. Hierarchical Deterministic Wallets for Secure Steganography in Blockchain
83 -- 95Ali Khosravi, Taraneh Eghlidos. Quantum Cryptanalysis of Symmetric Primitives by Improving Relaxed Variants of Simon's Algorithm
97 -- 110Sina Abdollahi, Javad Mohajeri, Mahmoud Salmasizadeh. Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT
111 -- 124Mahdi Sajadieh, Arash Mirzaei. 4n × 4n Diffusion Layers Based on Multiple 4 × 4 MDS Matrices
125 -- 135Mohammad Ebrahim Ebrahimi Kiasari, Nasrollah Pakniat, Abdolrasoul Mirghadri, Mojtaba Nazari. A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem
137 -- 151Bahram Rashidi. Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers