Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
An Efficient Scheme for Secure Medical Data Sharing in the Cloud

Iman Jafarian; Siavash Khorsandi

Volume 15, Issue 3 , October 2023, , Pages 59-66

https://doi.org/10.22042/isecure.2023.182206

Abstract
  The Internet of Things has significantly improved healthcare with its promise of transforming technological, social, and economic perspectives. Medical devices with wireless internet access enable remote monitoring of patients, and collectively, these increasingly smart and connected medical devices ...  Read More

Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks

Afshin Karampour; Maede Ashouri-Talouki; Behrouz Tork Ladani

Volume 14, Issue 3 , October 2022, , Pages 101-112

https://doi.org/10.22042/isecure.2022.14.3.11

Abstract
  Smart grids using information technology (IT) and communication networks control smart home appliances to reduce costs and increase reliability and transparency. Preserving the privacy of the user data is one of the biggest challenges in smart grid research; by disclosing user-related data, an internal ...  Read More

Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields

B. Rashidi; R. Rezaeian Farashahi; S. M. Sayedi

Volume 7, Issue 2 , July 2015, , Pages 101-114

https://doi.org/10.22042/isecure.2016.7.2.3

Abstract
  This paper presents two efficient implementations of fast and pipelined bit-parallel polynomial basis multipliers over GF (2m) by irreducible pentanomials and trinomials. The architecture of the first multiplier is based on a parallel and independent computation of powers of the polynomial variable. ...  Read More

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

M. Sabzinejad Farash; M. Ahmadian Attari

Volume 5, Issue 1 , January 2013, , Pages 55-70

https://doi.org/10.22042/isecure.2013.5.1.4

Abstract
  Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public ...  Read More