Journal: ISeCure

Volume 6, Issue 2

97 -- 98Rasool Jalili. Editorial
99 -- 123Ernesto Damiani, Stelvio Cimato, Gabriele Gianini. A risk model for cloud processes
125 -- 139Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri. Artemia: a family of provably secure authenticated encryption schemes
141 -- 153Ali Fanian, Fariba Alamifar, Mehdi Berenjkoub. An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
155 -- 167Mostafa Doroudian, Hamid Reza Shahriari. A hybrid approach for database intrusion detection at transaction and inter-transaction levels
169 -- 181Ehsan Shakeri, Shahrokh Ghaemmaghami. An extended feature set for blind image steganalysis in contourlet domain
183 -- 191Shiva Shamaei, Ali Movaghar. A two-phase wormhole attack detection scheme in MANETs

Volume 6, Issue 1

1 -- 2Rasool Jalili. Editorial
3 -- 22Saeed Shokrollahi, Fereidoon Shams, Javad Esmaeili. Access control in ultra-large-scale systems using a data-centric middleware
23 -- 34Shahram Rasoolzadeh, Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref. Total break of Zorro using linear and differential attacks
35 -- 52Fatemeh Raji, Ali Miri, Mohammad Davarpanah Jazi. A centralized privacy-preserving framework for online social networks
53 -- 66Hamzeh Ghasemzadeh, Ali Payandeh, Mohammad Reza Aref. Toward an energy efficient PKC-based key management system for wireless sensor networks
67 -- 76Asghar Tavakoly, Reza Ebrahimi Atani. Improving Tor security against timing and traffic analysis attacks with fair randomization
77 -- 89Mahdieh Zabihi, Majid Vafaei Jahan, Javad Hamidzadeh. A density based clustering approach to distinguish between web robot and human requests to a web server