Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. Detection of Fake Accounts in Social Networks Based on One Class Classification

Mohammad Reza Mohammadrezaei; Mohammad Ebrahim Shiri; Amir Masoud Rahmani

Volume 11, Issue 2 , Summer and Autumn 2019, , Pages 173-183

http://dx.doi.org/10.22042/isecure.2019.165312.450

Abstract
  Detection of fake accounts on social networks is a challenging process. The previous methods in identification of fake accounts have not considered the strength of the users’ communications, hence reducing their efficiency. In this work, we are going to present a detection method based on the users’ ...  Read More

2. Traceability improvements of a new RFID protocol based on EPC C1 G2

S. Sajjadi Ghaemmaghami; A. Haghbin; M. Mirmohseni

Volume 8, Issue 2 , Summer and Autumn 2016, , Pages 105-114

http://dx.doi.org/10.22042/isecure.2016.8.2.2

Abstract
  Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product ...  Read More

3. Enhancing privacy of recent authentication schemes for low-cost RFID systems

K. Baghery; B. Abdolmaleki; B. Akhbari; M. R. Aref

Volume 7, Issue 2 , Summer and Autumn 2015, , Pages 135-149

http://dx.doi.org/10.22042/isecure.2016.7.2.6

Abstract
  Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been ...  Read More

4. Artemia: a family of provably secure authenticated encryption schemes

J. Alizadeh; M. R. Aref; N. Bagheri

Volume 6, Issue 2 , Summer and Autumn 2014, , Pages 125-139

http://dx.doi.org/10.22042/isecure.2015.6.2.3

Abstract
  Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, ...  Read More

5. A centralized privacy-preserving framework for online social networks

F. Raji; A. Miri; M. Davarpanah Jazi

Volume 6, Issue 1 , Winter and Spring 2014, , Pages 35-52

http://dx.doi.org/10.22042/isecure.2014.6.1.4

Abstract
  There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically ...  Read More