Hierarchical Deterministic Wallets for Secure Steganography in Blockchain

Omid Torki; Maede Ashouri-Talouki; Mojtaba Mahdavi

Articles in Press, Accepted Manuscript, Available Online from 01 August 2022

http://dx.doi.org/10.22042/isecure.2022.319074.729

Abstract
  Steganography is a solution for covert communication and blockchain is a p2p network for data transmission, so the benefits of blockchain can be used in steganography. In this paper, we discuss the advantages of blockchain in steganography, which include the ability to embed hidden data without manual ...  Read More

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Maryam Zarezadeh; Maede Ashouri-Talouki; Mohammad Siavashi

Volume 12, Issue 2 , July 2020, , Pages 129-140

http://dx.doi.org/10.22042/isecure.2020.174338.458

Abstract
  Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha ...  Read More

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

A. Mohseni-Ejiyeh; M. Ashouri-Talouki; M. Mahdavi

Volume 10, Issue 1 , January 2018, , Pages 15-27

http://dx.doi.org/10.22042/isecure.2018.111195.401

Abstract
  Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the ...  Read More