Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems

Mahdieh Ebrahimi; Majid Bayat; Behnam Zahednejad

Articles in Press, Accepted Manuscript, Available Online from 28 August 2021

http://dx.doi.org/10.22042/isecure.2021.183936.463

Abstract
  The medical system remains among the fastest to adopt the Internet of Things. The reason for this trend is that integration Internet of Things(IoT) features into medical devices greatly improve the quality and effectiveness of service. However, there are many unsolved security problems. Due to medical ...  Read More

2. Providing a Hybrid Cryptography Algorithm for Lightweight Authentication Protocol in RFID with Urban Traffic Usage Case

Vahid Chegeni; Hamid Haj Seyyed Javadi; Mohammad Reza Moazami Goudarzi; Afshin Rezakhani

Volume 13, Issue 1 , Winter and Spring 2021, , Pages 73-85

http://dx.doi.org/10.22042/isecure.2020.226400.535

Abstract
  Today, the Internet of Things (IoT) is one of the emerging technologies that enable the connection and transfer of information through communication networks. The main idea of the IoT is the widespread presence of objects such as mobile devices, sensors, and RFID. With the increase in traffic volume ...  Read More

3. Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns

Saadi Hadjer; Yagoub Mustapha C.E.; Rachida TOUHAMI

Volume 11, Issue 3 , Summer and Autumn 2019, , Pages 9-17

http://dx.doi.org/10.22042/isecure.2019.11.0.2

Abstract
  The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, ...  Read More

4. A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Majid Bayat; Zahra Zare Jousheghani; Ashok Kumar Das; Pitam Singh; Saru Kumari; Mohammad Reza Aref

Volume 11, Issue 2 , Summer and Autumn 2019, , Pages 113-128

http://dx.doi.org/10.22042/isecure.2019.161366.445

Abstract
  Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important ...  Read More

5. Artemia: a family of provably secure authenticated encryption schemes

J. Alizadeh; M. R. Aref; N. Bagheri

Volume 6, Issue 2 , Summer and Autumn 2014, , Pages 125-139

http://dx.doi.org/10.22042/isecure.2015.6.2.3

Abstract
  Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, ...  Read More

6. Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

R. Ramezanian

Volume 1, Issue 1 , Winter and Spring 2009, , Pages 55-67

http://dx.doi.org/10.22042/isecure.2015.1.1.6

Abstract
  Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role ...  Read More