Journal: ISeCure

Volume 7, Issue 2

89 -- 90Rasool Jalili. Editorial
91 -- 99Samaneh Mashhadi. Computationally secure multiple secret sharing: models, schemes, and formal security analysis
101 -- 114Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi. Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields
115 -- 126Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Amir Hassani Karbasi. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
127 -- 134Javad Alizadeh, Mohammad Reza Aref, Nasour Bagheri, Hassan Sadeghi. Cryptanalysis of some first round CAESAR candidates
135 -- 149Karim Baghery, Behzad Abdolmaleki, Bahareh Akhbari, Mohammad Reza Aref. Enhancing privacy of recent authentication schemes for low-cost RFID systems
151 -- 166Mina Niknafs, Sadegh Dorri Nogoorani, Rasool Jalili. A collusion mitigation scheme for reputation systems

Volume 7, Issue 1

1 -- 2Rasool Jalili. Editorial
3 -- 14Ramin Ganjavi, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh. A traceable optimistic fair exchange protocol in the standard model
15 -- 26Reza Mortazavi, Saeed Jalili. A novel local search method for microaggregation
27 -- 45Morteza Amini, Majid Arasteh. A combination of semantic and attribute-based access control model for virtual organizations
47 -- 58Faramarz Sadeghi, Fatemeh Zarisfi Kermani, M. Kuchaki Rafsanjani. Optimizing image steganography by combining the GA and ICA
59 -- 74Safieh Ghasemi Falavarjani, Behrouz Tork Ladani, Simin Ghasemi. GGRA: a grouped gossip-based reputation aggregation algorithm
75 -- 81Mehrshad Vosoughi, Ali Jahanian 0001. Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability