- Omid Torki, Maede Ashouri-Talouki, Mojtaba Mahdavi:
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain. ISC Int. J. Inf. Secur. 15(1): 73-81 (2023) - Habib Allah Yajam, Mohammad Ali Akhaee:
Analysis of IOTA Tangle Stability in High Transaction Rates. ISC Int. J. Inf. Secur. 15(2) (2023) - 2022
- Mohammad Ali:
Attribute-Based Remote Data Auditing and User Authentication for Cloud Storage Systems. ISC Int. J. Inf. Secur. 14(3): 43-49 (2022) - Mahdieh Abazar, Peyman Masjedi, Mohammad Taheri:
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis. ISC Int. J. Inf. Secur. 14(1): 105-113 (2022) - Hadi Aghaee, Bahareh Akhbari:
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel. ISC Int. J. Inf. Secur. 14(3): 71-80 (2022) - Mitra Alidoosti, Alireza Nowroozi, Ahmad Nickabadi:
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer. ISC Int. J. Inf. Secur. 14(1): 83-104 (2022) - Hamid Amiryousefi, Zahra Ahmadian:
Revisiting the Security and Efficiency of SP2DAS, 3PDA, and EPPA Smart Grid Security Protocols. ISC Int. J. Inf. Secur. 14(2): 157-165 (2022) - Seyed Behnam Andarzian, Behrouz Tork Ladani:
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications. ISC Int. J. Inf. Secur. 14(1): 13-25 (2022) - Amir Ashtari, Ahmad Shabani, Bijan Alizadeh:
Mutual Lightweight PUF-Based Authentication Scheme Using Random Key Management Mechanism for Resource-Constrained IoT Devices. ISC Int. J. Inf. Secur. 14(3): 1-8 (2022) - Sepehr Damavandi, Sadegh Dorri Nogoorani:
An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs. ISC Int. J. Inf. Secur. 14(3): 123-133 (2022) - Hajar Dastanpour, Ali Fanian:
A Graph-based Online Feature Selection to Improve Detection of New Attacks. ISC Int. J. Inf. Secur. 14(2): 115-130 (2022) - Fatemeh Deldar, Mahdi Abadi, Mohammad Ebrahimifard:
Android Malware Detection Using One-Class Graph Neural Networks. ISC Int. J. Inf. Secur. 14(3): 51-60 (2022) - Mahdieh Ebrahimi, Majid Bayat, Behnam Zahednejad:
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems. ISC Int. J. Inf. Secur. 14(1): 57-68 (2022) - Saeed Banaeian Far, Maryam Rajabzadeh Assar:
An Efficient Pairing-Free Identity-Based Certificateless Signcryption. ISC Int. J. Inf. Secur. 14(1): 69-82 (2022) - Seyed Salar Ghazi, Haleh Amintoosi, Sahar Pilevar Moakhar:
On the Suitability of Improved TrustChain for Smartphones. ISC Int. J. Inf. Secur. 14(3): 33-42 (2022) - Muhamadali Hajisoltani, Raziyeh Salarifard, Hadi Soleimany:
Secure and Low-Area Implementation of the AES Using FPGA. ISC Int. J. Inf. Secur. 14(3): 93-99 (2022) - Mojtaba Hemmati, Mohammad Ali Hadavi:
Bypassing Web Application Firewalls Using Deep Reinforcement Learning. ISC Int. J. Inf. Secur. 14(2): 131-145 (2022) - Afshin Karampour, Maede Ashouri-Talouki, Behrouz Tork Ladani:
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks. ISC Int. J. Inf. Secur. 14(3): 101-112 (2022) - Farshideh Kordi, Hamed Hossein-Talaee, Ali Jahanian:
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack. ISC Int. J. Inf. Secur. 14(1): 47-55 (2022) - Mohammad Erfan Mazaheri, Siavash Bayat Sarmadi, Farhad Taheri Ardakani:
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly. ISC Int. J. Inf. Secur. 14(1): 27-46 (2022) - Somayeh Mozafari, Amir Jalaly Bidgoly:
Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach. ISC Int. J. Inf. Secur. 14(3): 81-92 (2022) - Hossein Oraei, Massoud Hadian Dehkordi:
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes. ISC Int. J. Inf. Secur. 14(1): 1-11 (2022) - Sajjad Palanki, Alireza Shafieinejad:
Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage. ISC Int. J. Inf. Secur. 14(3): 135-149 (2022) - Hamed Ramzanipour, Navid Vafaei, Nasour Bagheri:
Practical Differential Fault Analysis on CRAFT, a Lightweight Block Cipher. ISC Int. J. Inf. Secur. 14(3): 21-31 (2022) - Faeze Rasouli, Mohammad Taheri:
Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code. ISC Int. J. Inf. Secur. 14(2): 147-156 (2022) - Parvin Rastegari:
Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS. ISC Int. J. Inf. Secur. 14(2): 193-213 (2022) - Vajiheh Sabeti, Mahsa Amerehei:
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm. ISC Int. J. Inf. Secur. 14(2): 167-179 (2022) - Maryam Saeedi Sadr, Mohammad Ali Hadavi:
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud. ISC Int. J. Inf. Secur. 14(3): 113-121 (2022) - Zeinab Salami, Mahmoud Ahmadian-Attari, Mohammad Reza Aref, Hoda Jannati:
Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network. ISC Int. J. Inf. Secur. 14(2): 215-227 (2022)