Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
1. Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets

Vahid Meraji; Hadi Soleimany

Articles in Press, Accepted Manuscript, Available Online from 05 September 2020


  Numerous studies have been conducted to present new attacks using the time difference between the processor access to main memory and cache memory. Access-driven attacks are a series of cache-based attacks using fewer measurement samples to extract sensitive key values due to the ability of the attacker ...  Read More

Research Article
2. An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery

Salome James; Gowri Thumbur; P.Vasudeva Reddy

Articles in Press, Accepted Manuscript, Available Online from 06 October 2020


  In recent years, due to their potential applications, proxy blind signatures became an active research topic and are an extension of the basic proxy signature. A proxy blind signature scheme enables a proxy signer to produce a blind signature on behalf of an original signer. Such schemes are useful in ...  Read More

Research Article
3. OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing

K. Nalini Sujantha Bel; I.Shatheesh Sam

Articles in Press, Accepted Manuscript, Available Online from 18 October 2020


  A novel feature extraction algorithm using Otsu’s Threshold (OT-features) on scrambled images and the Instantaneous Clustering (IC-CBIR) approach is proposed for Content-Based Image Retrieval in cloud computing. Images are stored in the cloud in an encrypted or scrambled form to preserve the privacy ...  Read More

Research Article
4. Hardware Trojan Prevention and Detection by Filling Unused Space Using Shift registers, Gate-chain and Extra Routing

Mansoureh Labbafniya; Shahram Etemadi Borujeni; Roghaye Saeidi

Articles in Press, Accepted Manuscript, Available Online from 19 October 2020


   Nowadays the security of the design is so important because of the different available attacks to the system. the main aim of this paper is to improve the security of the circuit design implemented on FPGA device. Two approaches are proposed for this purpose. The first is to fill out empty space ...  Read More