Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Private Federated Learning: An Adversarial Sanitizing Perspective

Mojtaba Shirinjani; Siavash Ahmadi; Taraneh Eghlidos; Mohammad Reza Aref

Volume 15, Issue 3 , October 2023, , Pages 67-76

https://doi.org/10.22042/isecure.2023.182211

Abstract
  Large-scale data collection is challenging in alternative centralized learning as privacy concerns or prohibitive policies may rise. As a solution, Federated Learning (FL) is proposed wherein data owners, called participants, can train a common model collaboratively while their privacy is preserved. ...  Read More

Human Activity Recognition Based on Multi-Sensors in a Smart Home Using Deep Learning

Musbah Aqel; Munsif Sokiyna

Volume 13, Issue 3 , November 2021, , Pages 69-78

https://doi.org/10.22042/isecure.2021.13.3.0

Abstract
  Tracking or taking care of elderly people when they live alone is much challenging area. Because most of the aged people suffering from some health issues like Alzheimer, diabetes, and hypertension, so in case happening any abnormal activity or any emergency situation since they live alone and there ...  Read More

One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel

Hadi Aghaee; Bahareh Akhbari

Volume 14, Issue 3 , October 2022, , Pages 71-80

https://doi.org/10.22042/isecure.2022.14.3.8

Abstract
  In this paper, we want to derive achievable secrecy rate regions for quantum interference channels with classical inputs under a one-shot setting. The main idea to this end is to use the combination of superposition and rate splitting for the encoding scheme and construct a decoding scheme based on simultaneous ...  Read More

Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer

Shereen S. Jumaa

Volume 12, Issue 3 , November 2020, , Pages 73-79

https://doi.org/10.22042/isecure.2021.271062.616

Abstract
  Simple signs existent in mammograms for diagnosing breast cancer are considered to be microcalcifications or MCs. Therefore, true detection of MCs is needed to minimize schedule diagnosis, efficient care and death rate due to breast cancer. A challenging task is to evaluate and interpret mammograms and, ...  Read More

A Lightweight Mutual Authentication Scheme for VANETs Between Vehicles and RSUs

Mohamadreza Amani; Javad Mohajeri; Mahmoud Salmasizadeh

Volume 15, Issue 3 , October 2023, , Pages 77-89

https://doi.org/10.22042/isecure.2023.417758.1018

Abstract
  Vehicular Ad-hoc Networks (VANETs) have emerged as part of Intelligent Transportation Systems (ITS), offering the potential to enhance passenger and driver safety, as well as driving conditions. However, VANETs face significant security challenges and various attacks due to their wireless nature and ...  Read More

Slowloris Attack Detection Using Adaptive Timeout-Based Approach

Kangkan Talukdar; Debojit Boro

Volume 16, Issue 1 , January 2024, , Pages 79-92

https://doi.org/10.22042/isecure.2023.392462.938

Abstract
  Distributed Denial of Service (DDoS) attacks have become a critical threat to the Web with the increase in web-based transactions and application services offered by the Internet. With the vast resources and techniques easily available to the attackers countering them has become more challenging. They ...  Read More

Indexed View Technique to Speed-up Data Warehouse Query Processing

Talib M. J. Al Taleb; Sami Hasan; Yaqoob Yousif Mahdi

Volume 12, Issue 3 , November 2020, , Pages 81-85

https://doi.org/10.22042/isecure.2021.271059.615

Abstract
  The data warehouse size and query complexity may cause an unacceptable delay in decision support queries. A basic condition for the success of a data warehouse is the capability to supply decision-makers with both precise information and best response time. For this purpose, the concept of indexed views ...  Read More

Lightweight Identification of Android Malware with Knowledge Distillation and Deep Learning Approach

Somayeh Mozafari; Amir Jalaly Bidgoly

Volume 14, Issue 3 , October 2022, , Pages 81-92

https://doi.org/10.22042/isecure.2022.14.3.9

Abstract
  Today, with the advancement of science and technology, the use of smartphones has become very common, and the Android operating system has been able to gain lots of popularity in the meantime. However, these devices face manysecurity challenges, including malware. Malware may cause many problems in both ...  Read More

The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case

Mustapha Bassiri; Abderrazak Mazouak; Imad Lamniai; Malika Tridane; Said Belaaouad; Said Belaaouad

Volume 12, Issue 3 , November 2020, , Pages 87-93

https://doi.org/10.22042/isecure.2021.271064.618

Abstract
  The application of New Information and Communication Technologies (NICT) in the field of training led to the creation of this new reality called distance learning. Described as the marriage of multimedia (sound, image, text) and the Internet (online distribution, interactivity) DT has no doubt allowed ...  Read More

New Variations of Discrete Logarithm Problem

Mahdi Mahdavi Oliaee; Sahar Khaleghifard; Zahra Ahmadian

Volume 15, Issue 3 , October 2023, , Pages 91-100

https://doi.org/10.22042/isecure.2023.184477

Abstract
  The security of public key cryptography relies on the complexity of certain mathematical hard problems. It is vital to comprehend the intricacy of these problems to develop secure cryptographic schemes and security protocols. This paper provides an overview of some widely recognized hard problems associated ...  Read More

Secure and Low-Area Implementation of the AES Using FPGA

Muhamadali Hajisoltani; Raziyeh Salarifard; Hadi Soleimany

Volume 14, Issue 3 , October 2022, , Pages 93-99

https://doi.org/10.22042/isecure.2022.14.3.0

Abstract
  Masking techniques are used to protect the hardware implementation of cryptographic algorithms against side-channel attacks. Reconfigurable hardware, such as FPGA, is an ideal target for the secure implementation of cryptographic algorithms. Due to the restricted resources available to the reconfigurable ...  Read More

HUAP: Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices

Mostafa Chegenizadeh; Mohammad Ali; Javad Mohajeri; Mohammad Reza Aref

Volume 16, Issue 1 , January 2024, , Pages 93-114

https://doi.org/10.22042/isecure.2023.395028.954

Abstract
  Attribute-based encryption (ABE) is a promising cryptographic mechanism for providing confidentiality and fine-grained access control in the cloud-based area.However, due to high computational overhead, common ABE schemes are not suitable for resource-constrained devices.Additionally, access policies ...  Read More

Knowledge Discovery in Cloud-Computing Environment and the Challenges

Najah K. Almazmomi

Volume 12, Issue 3 , November 2020, , Pages 95-99

https://doi.org/10.22042/isecure.2021.273750.640

Abstract
  Today, in the area of telecommunication, social media, the internet of things (IoT), and the virtual world, enormous amounts of data are being generated which are extracted to discover knowledge. Knowledge discovery from data in the cloud-computing environment entails the extraction of the new and necessary ...  Read More

Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology

Wafa Abdulaziz Alkenazan; Ashraf A. Taha; Mohammed J.F. Alenazi; Wadood Abdul

Volume 12, Issue 3 , November 2020, , Pages 101-109

https://doi.org/10.22042/isecure.2021.274868.642

Abstract
  Due to the increasing number of cars and the difficulty to find vacant parking spots easily, the smart parking system is essential to save time and efforts of drivers and to protect the environment from emissions and air pollution. Wireless Sensor Networks used in smart parking systems consists of a ...  Read More

Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks

Afshin Karampour; Maede Ashouri-Talouki; Behrouz Tork Ladani

Volume 14, Issue 3 , October 2022, , Pages 101-112

https://doi.org/10.22042/isecure.2022.14.3.11

Abstract
  Smart grids using information technology (IT) and communication networks control smart home appliances to reduce costs and increase reliability and transparency. Preserving the privacy of the user data is one of the biggest challenges in smart grid research; by disclosing user-related data, an internal ...  Read More

Post Quantum Digital Signature Based on the McEliece Cryptosystems with Dual Inverse Matrix

Farshid Haidary Makoui; Thomas Aaron Gulliver; Mohammad Dakhilalian

Volume 15, Issue 3 , October 2023, , Pages 101-108

https://doi.org/10.22042/isecure.2023.419559.1026

Abstract
  Digital signatures are used to ensure legitimate access through identity authentication. They are also used in blockchains and to authenticate transactions. Code-based digital signatures are not widely used due to their complexity. This paper presents a new code-based signature algorithm withlower complexity ...  Read More

HyLock: Hybrid Logic Locking Based on Structural Fuzzing for Resisting Learning-based Attacks

Mohammad Moradi Shahmiri; Bijan Alizadeh

Volume 15, Issue 3 , October 2023, , Pages 109-115

https://doi.org/10.22042/isecure.2023.417837.1019

Abstract
  The growing popularity of the fabless manufacturing model and the resulting threats have increased the importance of Logic locking as a key-based method for intellectual property (IP) protection. Recently, machine learning (ML)-based attacks have broken most existing locks by exploiting structural traces ...  Read More

A Multilingual Infobot in Airports

Ghada Al-Hudhud; Abeer Al-Humamidi

Volume 12, Issue 3 , November 2020, , Pages 111-115

https://doi.org/10.22042/isecure.2021.274961.643

Abstract
  A Chatbot is a smart software that responds to natural language input and attempts to hold a conversation in a way that simulates humans. Chatbots have the potential to save any individual’s time, hassle, and tedium by automating mundane tasks. The idea of this research is that to investigate how ...  Read More

SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud

Maryam Saeedi Sadr; Mohammad Ali Hadavi

Volume 14, Issue 3 , October 2022, , Pages 113-121

https://doi.org/10.22042/isecure.2022.14.3.12

Abstract
  The use of NoSQL data and its storage in the Cloud is growing rapidly. Due to the accumulation of data in the Cloud, data security against untrusted service providers as well as external attackers becomes a more serious problem. Over the past few years, there are some efforts to secure the outsourcing ...  Read More

Reverse Image-Based Search Engine for IP Trademarks

Abeer Sulaiman Al-Humaimeedy; Abeer Salman Al-Hammad; Ghada Al-Hudhud

Volume 12, Issue 3 , November 2020, , Pages 117-127

https://doi.org/10.22042/isecure.2021.277174.651

Abstract
  In a world full of many ideas turning to various kinds of products that need to be protected and here comes the importance of intellectual property rights. Intellectual property has many types however, our interest is in trademarks. The Madrid system is a system used by a group of countries that were ...  Read More

A Lightweight RFID Grouping Proof Protocol With Forward Secrecy and Resistant to Reader Compromised Attack

Fateme Borjal Bayatiani; Hamid Mala

Volume 15, Issue 3 , October 2023, , Pages 117-128

https://doi.org/10.22042/isecure.2023.418765.1030

Abstract
  Today, passive RFID tags have many applications in various fields such as healthcare, transportation, asset management, and supply chain management. In some of these applications, a group of tags need to prove they are present in the same place at the same time. To solve this problem, many protocols ...  Read More

An Electronic Voting Scheme Based on Blockchain Technology and Zero-Knowledge Proofs

Sepehr Damavandi; Sadegh Dorri Nogoorani

Volume 14, Issue 3 , October 2022, , Pages 123-133

https://doi.org/10.22042/isecure.2022.14.3.13

Abstract
  Voting is a fundamental mechanism used by many human societies, organizations and nations to make collective decisions. There has been a tremendous effort on making this mechanism fairer, error-free and secure. Electronic voting aims to be a solution to some deficiencies of existing paper-based voting ...  Read More

New Directions in the Design of Binary Matrices for SPN Block Ciphers

Mahdi Sajadieh; Arash Mirzaei

Volume 15, Issue 3 , October 2023, , Pages 129-138

https://doi.org/10.22042/isecure.2024.421696.1035

Abstract
  The diffusion layer plays an important role in a block cipher. Some block ciphers, such as ARIA, Camellia, and Skinny use binary matrices as diffusion layers which can be efficiently implemented in hardware and software. In this paper, the goal is to propose some new binary matrices with suitable values ...  Read More

Attribute-Based Encryption with Efficient Attribute Revocation, Decryption Outsourcing, and Multi-Keyword Searching in Cloud Storage

Sajjad Palanki; Alireza Shafieinejad

Volume 14, Issue 3 , October 2022, , Pages 135-149

https://doi.org/10.22042/isecure.2022.14.3.14

Abstract
  Reliable access control is a major challenge of cloud storage services. This paper presents a cloud-based file-sharing architecture with ciphertext-policy attribute-based encryption (CP-ABE) access control mechanism. In CP-ABE, the data owner can specify the ciphertext access structure, and if the user ...  Read More

Integral Cryptanalysis of Reduced-Round SAND-64 Based on Bit-Based Division Property

Atiyeh Mirzaie; Siavash Ahmadi; Mohammad Reza Aref

Volume 15, Issue 3 , October 2023, , Pages 139-147

https://doi.org/10.22042/isecure.2023.187449

Abstract
  Conventional Bit-based Division Property (CBDP), as a generalization of integral property, has been a powerful tool for integral cryptanalysis of many block ciphers. Exploiting a Mixed Integral Linear Programming (MILP) optimizer, an alternative approach to searching integral distinguishers was proposed, ...  Read More