researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: ISeCure
Home
Index
Info
Volume
Volume
3
, Issue
2
67
--
68
Rasool Jalili
.
Editorial
69
--
76
Phillip Rogaway
.
Constructing cryptographic definitions
77
--
101
Hamid Farhadi
,
Maryam AmirHaeri
,
Mohammad Khansari
.
Alert correlation and prediction using data mining and HMM
103
--
120
Zahra Derakhshandeh
,
Behrouz Tork Ladani
.
A model for specification, composition and verification of access control policies and its application to web services
121
--
133
Somayeh Soltani
,
Mohammad Ali Hadavi
,
Rasool Jalili
.
Separating indexes from data: a distributed scheme for secure database outsourcing
Volume
3
, Issue
1
1
--
2
Rasool Jalili
.
Editorial
3
--
27
Matt Bishop
.
Computer security in the future
29
--
42
Ehsan Malekian
,
Ali Zakerolhosseini
,
Atefeh Mashatan
.
QTRU: quaternionic version of the NTRU public-key cryptosystems
43
--
50
Yaser Baseri
,
Amir S. Mortazavi
,
Maryam Rajabzadeh Asaar
,
Mohsen Pourpouneh
,
Javad Mohajeri
.
Double voter perceptible blind signature based electronic voting protocol
51
--
66
Mehran Deljavan Amiri
,
Habibollah Danyali
,
Bahram Zahir Azami
.
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms