Journal: ISeCure

Volume 9, Issue 2

99 -- 100Mohammad Reza Aref. Editorial
101 -- 110Shahram Khazaei, Farokhlagha Moazami. On the computational complexity of finding a minimal basis for the guess and determine attack
111 -- 118Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram. An efficient secure channel coding scheme based on polar codes
119 -- 130Morteza Safaei Pour, Mahmoud Salmasizadeh. A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study
131 -- 145Hamzeh Ghasemzadeh, Mehdi Tajik Khass, Hamed Mehrara. Cipher text only attack on speech time scrambling systems using correction of audio spectrogram
147 -- 159Maryam Imani, Gholam Ali Montazer. Phishing website detection using weighted feature line embedding
161 -- 181Javad Hajian Nezhad, Majid Vafaei Jahan, Mohammad-H. Tayarani-N., Zohre Sadrnezhad. Analyzing new features of infected web content in detection of malicious web pages
183 -- 189. Persian Abstract

Volume 9, Issue 1

1 -- 2Mohammad Reza Aref. Editorial
3 -- 16Parvin Rastegari, Mehdi Berenjkoub. An efficient certificateless signcryption scheme in the standard model
17 -- 26Ehsan Aerabi, Mahdi Kaykha, Mahdi Fazeli, Ahmad Patooghy, Ahmad Akbari. Side channel parameter characteristics of code injection attacks
27 -- 39Alireza Ahadipour, Alireza Keshavarz-Haddad. LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
41 -- 51Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar. A new security proof for FMNV continuous non-malleable encoding scheme
53 -- 72AliAkbar Sadeghi, Farzane Aminmansour, Hamid Reza Shahriari. Dwarf Frankenstein is still in your memory: tiny code reuse attacks
73 -- 91Marzieh Safarzadeh, Mahboubeh Taghizadeh, Bahman Zamani, Behrouz Tork Ladani. An automatic test case generator for evaluating implementation of access control policies