Journal: ISeCure

Volume 2, Issue 2

67 -- 68Rasool Jalili. Editorial
69 -- 87Farzad Salim, Jason Reid, Ed Dawson. Authorization models for secure information sharing: a survey and research agenda
89 -- 105Ali Fanian, Mehdi Berenjkoub, Hossein Saidi 0001, T. Aaron Gulliver. An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
107 -- 118Adnan Abdul-Aziz Gutub, Ahmed Al-Nazer. High capacity steganography tool for Arabic text using 'Kashida'
119 -- 128Mojtaba Abolghasemi, Hassan Aghaeinia, Karim Faez. Detection of perturbed quantization (PQ) steganography based on empirical matrix

Volume 2, Issue 1

1 -- 2Rasool Jalili. Editorial
3 -- 11Vincent Rijmen. Stream ciphers and the eSTREAM project
13 -- 32Mahdi Abadi, Saeed Jalili. A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
33 -- 46Mohammad Saniee Abadeh, Jafar Habibi. A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
47 -- 66Sareh Sadat Emami, Saadan Zokaei. A context-sensitive dynamic role-based access control model for pervasive computing environments