Journal: ISeCure

Volume 3, Issue 2

67 -- 68Rasool Jalili. Editorial
69 -- 76Phillip Rogaway. Constructing cryptographic definitions
77 -- 101Hamid Farhadi, Maryam AmirHaeri, Mohammad Khansari. Alert correlation and prediction using data mining and HMM
103 -- 120Zahra Derakhshandeh, Behrouz Tork Ladani. A model for specification, composition and verification of access control policies and its application to web services
121 -- 133Somayeh Soltani, Mohammad Ali Hadavi, Rasool Jalili. Separating indexes from data: a distributed scheme for secure database outsourcing

Volume 3, Issue 1

1 -- 2Rasool Jalili. Editorial
3 -- 27Matt Bishop. Computer security in the future
29 -- 42Ehsan Malekian, Ali Zakerolhosseini, Atefeh Mashatan. QTRU: quaternionic version of the NTRU public-key cryptosystems
43 -- 50Yaser Baseri, Amir S. Mortazavi, Maryam Rajabzadeh Asaar, Mohsen Pourpouneh, Javad Mohajeri. Double voter perceptible blind signature based electronic voting protocol
51 -- 66Mehran Deljavan Amiri, Habibollah Danyali, Bahram Zahir Azami. Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms