Journal: ISeCure

Volume 5, Issue 2

117 -- 118Rasool Jalili. Editorial
119 -- 140Seyyed Ahmad Javadi, Morteza Amini. A semantic-aware role-based access control model for pervasive computing environments
141 -- 154Masoud Amoozgar, Rasoul Ramezanian. A computational model and convergence theorem for rumor dissemination in social networks
155 -- 170Mansooreh Ezhei, Behrouz Tork Ladani. GTrust: a group based trust model
171 -- 187Hossein Mohammadhassanzadeh, Hamid Reza Shahriari. Prediction of user's trustworthiness in web-based social networks via text mining
189 -- 208Sepideh Avizheh, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh. Convertible limited (multi-) verifier signature: new constructions and applications
209 -- 225Reza Azmi, Boshra Pishgoo. STLR: a novel danger theory based structural TLR algorithm

Volume 5, Issue 1

1 -- 3Rasool Jalili. Editorial
5 -- 36Mohammad Ali Akhaee, Farokh Marvasti. A survey on digital data hiding schemes: principals, algorithms, and applications
37 -- 53Mahdi Soodkhah Mohammadi, Abbas Ghaemi Bafghi. Design and formal verification of DZMBE+
55 -- 70Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari. Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
71 -- 82Mahboobe Ghiasi, Ashkan Sami, Zahra Salehi. DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
83 -- 95Abolfazl Diyanat, Mohammad Ali Akhaee, Shahrokh Ghaemmaghami. Robust multiplicative video watermarking using statistical modeling
97 -- 110Elham Hassani, Mohammad Eshghi. Image encryption based on chaotic tent map in time and frequency domains