Journal: ISeCure

Volume 8, Issue 2

91 -- 92Mohammad Reza Aref. Editorial
93 -- 104Sharareh Zamanzadeh, Ali Jahanian 0001. ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
105 -- 114Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni. Traceability improvements of a new RFID protocol based on EPC C1 G2
115 -- 130Taha Yasin Rezapour, Reza Ebrahimi Atani, Meer Soheil Abolghasemi. A novel key management scheme for heterogeneous sensor networks based on the position of nodes
131 -- 139Nematollah Zarmehi, Mohammad Reza Aref. Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling
141 -- 153Ali Sedaghatbaf, Mohammad Abdollahi Azgomi. Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
155 -- 160Masoumeh Safkhani, Nasour Bagheri. A note on the security of two improved RFID protocols

Volume 8, Issue 1

1 -- 2Mohammad Reza Aref. Editorial
3 -- 24Mohsen Pourpouneh, Rasoul Ramezanian. A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
25 -- 38Hamidreza Amini Khorasgani, Saba Asaad, Hossein Pilaram, Taraneh Eghlidos, Mohammad Reza Aref. On the design and security of a lattice-based threshold secret sharing scheme
39 -- 52Farzane Aminmansour, Hamid Reza Shahriari. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture
53 -- 60Sharareh Zamanzadeh, Ali Jahanian 0001. Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose
61 -- 71Meisam Kamarei, Ahmad Patooghy, Mahdi Fazeli. Unauthenticated event detection in wireless sensor networks using sensors co-coverage
73 -- 84Akram Khalesi, Hossein Bahramgiri, Davod Mansuri. A new method for accelerating impossible differential cryptanalysis and its application on LBlock