default search action
ISC International Journal of Information Security, Volume 14
Volume 14, Number 1, January 2022
- Hossein Oraei, Massoud Hadian Dehkordi:
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes. 1-11 - Seyed Behnam Andarzian, Behrouz Tork Ladani:
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications. 13-25 - Mohammad Erfan Mazaheri, Siavash Bayat Sarmadi, Farhad Taheri Ardakani:
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly. 27-46 - Farshideh Kordi, Hamed Hossein-Talaee, Ali Jahanian:
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack. 47-55 - Mahdieh Ebrahimi, Majid Bayat, Behnam Zahednejad:
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems. 57-68 - Saeed Banaeian Far, Maryam Rajabzadeh Assar:
An Efficient Pairing-Free Identity-Based Certificateless Signcryption. 69-82 - Mitra Alidoosti, Alireza Nowroozi, Ahmad Nickabadi:
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer. 83-104 - Mahdieh Abazar, Peyman Masjedi, Mohammad Taheri:
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis. 105-113
Volume 14, Number 2, July 2022
- Hajar Dastanpour, Ali Fanian:
A Graph-based Online Feature Selection to Improve Detection of New Attacks. 115-130 - Mojtaba Hemmati, Mohammad Ali Hadavi:
Bypassing Web Application Firewalls Using Deep Reinforcement Learning. 131-145 - Faeze Rasouli, Mohammad Taheri:
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code. 147-156 - Hamid Amiryousefi, Zahra Ahmadian:
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols. 157-165 - Vajiheh Sabeti, Mahsa Amerehei:
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm. 167-179 - Parvin Rastegari:
Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS. 193-213 - Zeinab Salami, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Hoda Jannati:
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network. 215-227
Volume 14, Number 3, October 2022
- Amir Ashtari, Ahmad Shabani, Bijan Alizadeh:
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices. 1-8 - Navid Vafaei, Maryam Porkar, Hamed Ramzanipour, Nasour Bagheri:
Practical Differential Fault Analysis on SKINNY. 9-19 - Hamed Ramzanipour, Navid Vafaei, Nasour Bagheri:
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher. 21-31 - Seyed Salar Ghazi, Haleh Amintoosi, Sahar Pilevar Moakhar:
On the Suitability of Improved TrustChain for Smartphones. 33-42 - Mohammad Ali:
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems. 43-49 - Fatemeh Deldar, Mahdi Abadi, Mohammad Ebrahimifard:
Android Malware Detection Using One-Class Graph Neural Networks. 51-60 - Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani:
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System. 61-69 - Hadi Aghaee, Bahareh Akhbari:
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel. 71-80 - Somayeh Mozafari, Amir Jalaly Bidgoly:
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach. 81-92 - Muhamadali Hajisoltani, Raziyeh Salarifard, Hadi Soleimany:
Secure and Low-Area Implementation of the AES Using FPGA. 93-99 - Afshin Karampour, Maede Ashouri-Talouki, Behrouz Tork Ladani:
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks. 101-112 - Maryam Saeedi Sadr, Mohammad Ali Hadavi:
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud. 113-121 - Sepehr Damavandi, Sadegh Dorri Nogoorani:
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs. 123-133 - Sajjad Palanki, Alireza Shafieinejad:
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage. 135-149
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.