researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: ISeCure
Home
Index
Info
Volume
Volume
6
, Issue
2
97
--
98
Rasool Jalili
.
Editorial
99
--
123
Ernesto Damiani
,
Stelvio Cimato
,
Gabriele Gianini
.
A risk model for cloud processes
125
--
139
Javad Alizadeh
,
Mohammad Reza Aref
,
Nasour Bagheri
.
Artemia: a family of provably secure authenticated encryption schemes
141
--
153
Ali Fanian
,
Fariba Alamifar
,
Mehdi Berenjkoub
.
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
155
--
167
Mostafa Doroudian
,
Hamid Reza Shahriari
.
A hybrid approach for database intrusion detection at transaction and inter-transaction levels
169
--
181
Ehsan Shakeri
,
Shahrokh Ghaemmaghami
.
An extended feature set for blind image steganalysis in contourlet domain
183
--
191
Shiva Shamaei
,
Ali Movaghar
.
A two-phase wormhole attack detection scheme in MANETs
Volume
6
, Issue
1
1
--
2
Rasool Jalili
.
Editorial
3
--
22
Saeed Shokrollahi
,
Fereidoon Shams
,
Javad Esmaeili
.
Access control in ultra-large-scale systems using a data-centric middleware
23
--
34
Shahram Rasoolzadeh
,
Zahra Ahmadian
,
Mahmoud Salmasizadeh
,
Mohammad Reza Aref
.
Total break of Zorro using linear and differential attacks
35
--
52
Fatemeh Raji
,
Ali Miri
,
Mohammad Davarpanah Jazi
.
A centralized privacy-preserving framework for online social networks
53
--
66
Hamzeh Ghasemzadeh
,
Ali Payandeh
,
Mohammad Reza Aref
.
Toward an energy efficient PKC-based key management system for wireless sensor networks
67
--
76
Asghar Tavakoly
,
Reza Ebrahimi Atani
.
Improving Tor security against timing and traffic analysis attacks with fair randomization
77
--
89
Mahdieh Zabihi
,
Majid Vafaei Jahan
,
Javad Hamidzadeh
.
A density based clustering approach to distinguish between web robot and human requests to a web server