researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: ISeCure
Home
Index
Info
Volume
Volume
2
, Issue
2
67
--
68
Rasool Jalili
.
Editorial
69
--
87
Farzad Salim
,
Jason Reid
,
Ed Dawson
.
Authorization models for secure information sharing: a survey and research agenda
89
--
105
Ali Fanian
,
Mehdi Berenjkoub
,
Hossein Saidi 0001
,
T. Aaron Gulliver
.
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
107
--
118
Adnan Abdul-Aziz Gutub
,
Ahmed Al-Nazer
.
High capacity steganography tool for Arabic text using 'Kashida'
119
--
128
Mojtaba Abolghasemi
,
Hassan Aghaeinia
,
Karim Faez
.
Detection of perturbed quantization (PQ) steganography based on empirical matrix
Volume
2
, Issue
1
1
--
2
Rasool Jalili
.
Editorial
3
--
11
Vincent Rijmen
.
Stream ciphers and the eSTREAM project
13
--
32
Mahdi Abadi
,
Saeed Jalili
.
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
33
--
46
Mohammad Saniee Abadeh
,
Jafar Habibi
.
A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
47
--
66
Sareh Sadat Emami
,
Saadan Zokaei
.
A context-sensitive dynamic role-based access control model for pervasive computing environments