researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: ISeCure
Home
Index
Info
Volume
Volume
5
, Issue
2
117
--
118
Rasool Jalili
.
Editorial
119
--
140
Seyyed Ahmad Javadi
,
Morteza Amini
.
A semantic-aware role-based access control model for pervasive computing environments
141
--
154
Masoud Amoozgar
,
Rasoul Ramezanian
.
A computational model and convergence theorem for rumor dissemination in social networks
155
--
170
Mansooreh Ezhei
,
Behrouz Tork Ladani
.
GTrust: a group based trust model
171
--
187
Hossein Mohammadhassanzadeh
,
Hamid Reza Shahriari
.
Prediction of user's trustworthiness in web-based social networks via text mining
189
--
208
Sepideh Avizheh
,
Maryam Rajabzadeh Asaar
,
Mahmoud Salmasizadeh
.
Convertible limited (multi-) verifier signature: new constructions and applications
209
--
225
Reza Azmi
,
Boshra Pishgoo
.
STLR: a novel danger theory based structural TLR algorithm
Volume
5
, Issue
1
1
--
3
Rasool Jalili
.
Editorial
5
--
36
Mohammad Ali Akhaee
,
Farokh Marvasti
.
A survey on digital data hiding schemes: principals, algorithms, and applications
37
--
53
Mahdi Soodkhah Mohammadi
,
Abbas Ghaemi Bafghi
.
Design and formal verification of DZMBE+
55
--
70
Mohammad Sabzinejad Farash
,
Mahmoud Ahmadian-Attari
.
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
71
--
82
Mahboobe Ghiasi
,
Ashkan Sami
,
Zahra Salehi
.
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
83
--
95
Abolfazl Diyanat
,
Mohammad Ali Akhaee
,
Shahrokh Ghaemmaghami
.
Robust multiplicative video watermarking using statistical modeling
97
--
110
Elham Hassani
,
Mohammad Eshghi
.
Image encryption based on chaotic tent map in time and frequency domains