


default search action
ISC International Journal of Information Security, Volume 5
Volume 5, Number 1, January 2013
- Rasool Jalili:
Editorial. 1-3
- Mohammad Ali Akhaee, Farokh Marvasti:
A survey on digital data hiding schemes: principals, algorithms, and applications. 5-36
- Mahdi Soodkhah Mohammadi, Abbas Ghaemi Bafghi:
Design and formal verification of DZMBE+. 37-53 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari:
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. 55-70 - Mahboobe Ghiasi, Ashkan Sami, Zahra Salehi:
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers. 71-82 - Abolfazl Diyanat, Mohammad Ali Akhaee, Shahrokh Ghaemmaghami:
Robust multiplicative video watermarking using statistical modeling. 83-95 - Elham Hassani, Mohammad Eshghi:
Image encryption based on chaotic tent map in time and frequency domains. 97-110
Volume 5, Number 2, July 2013
- Rasool Jalili:
Editorial. 117-118
- Seyyed Ahmad Javadi, Morteza Amini:
A semantic-aware role-based access control model for pervasive computing environments. 119-140 - Masoud Amoozgar, Rasoul Ramezanian:
A computational model and convergence theorem for rumor dissemination in social networks. 141-154 - Mansooreh Ezhei, Behrouz Tork Ladani:
GTrust: a group based trust model. 155-170 - Hossein Mohammadhassanzadeh, Hamid Reza Shahriari:
Prediction of user's trustworthiness in web-based social networks via text mining. 171-187 - Sepideh Avizheh, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh:
Convertible limited (multi-) verifier signature: new constructions and applications. 189-208 - Reza Azmi, Boshra Pishgoo:
STLR: a novel danger theory based structural TLR algorithm. 209-225

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.