Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing

Mansoureh Labbafniya; Shahram Etemadi Borujeni; Roghaye Saeidi

Volume 13, Issue 1 , Winter and Spring 2021, , Pages 47-57


   Nowadays the security of the design is so important because of the different available attacks to the system. the main aim of this paper is to improve the security of the circuit design implemented on FPGA device. Two approaches are proposed for this purpose. The first is to fill out empty space ...  Read More

2. Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

Saadi Hadjer; Yagoub Mustapha C.E.; Rachida TOUHAMI

Volume 11, Issue 3 , Summer and Autumn 2019, , Pages 9-17


  The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, ...  Read More

3. Secure FPGA Design by Filling Unused Spaces

Mansoureh Labbafniya; Roghaye Saeidi

Volume 11, Issue 1 , Winter and Spring 2019, , Pages 47-56


  Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats ...  Read More

4. An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

A. Mohseni-Ejiyeh; M. Ashouri-Talouki; M. Mahdavi

Volume 10, Issue 1 , Winter and Spring 2018, , Pages 15-27


  Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the ...  Read More

5. Enhancing privacy of recent authentication schemes for low-cost RFID systems

K. Baghery; B. Abdolmaleki; B. Akhbari; M. R. Aref

Volume 7, Issue 2 , Summer and Autumn 2015, , Pages 135-149


  Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been ...  Read More

6. A survey on digital data hiding schemes: principals, algorithms, and applications

M. A. Akhaee; F. Marvasti

Volume 5, Issue 1 , Winter and Spring 2013, , Pages 5-36


  This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria ...  Read More

7. A chaos-based video watermarking algorithm

S. Mohammadi; A. Hakimi

Volume 4, Issue 1 , Winter and Spring 2012, , Pages 77-86


  The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential ...  Read More

8. Authorization models for secure information sharing: a survey and research agenda

F. Salim; J. Reid; E. Dawson

Volume 2, Issue 2 , Summer and Autumn 2010, , Pages 69-87


  This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency ...  Read More

9. Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

R. Ramezanian

Volume 1, Issue 1 , Winter and Spring 2009, , Pages 55-67


  Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role ...  Read More