Journal: Information Systems Security

Volume 32, Issue 3

163 -- 172Samaneh Mashhadi. Game-based security proofs for verifiable secret sharing schemes in the standard model
173 -- 186Bilal Akhtar, Ammar Masood. Security analysis and enhancements of UAS architecture
187 -- 211M. Naim, A. Ali-Pacha. New chaotic satellite image encryption by using some or all the rounds of the AES algorithm
212 -- 226Naib Rabiaa, Ali Cherif Moussa, boukli hacene sofiane. A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks