Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
76. A combination of semantic and attribute-based access control model for virtual organizations

M. Amini; M. Arasteh

Volume 7, Issue 1 , Winter and Spring 2015, , Pages 27-45


  A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which ...  Read More

77. LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

A. R. Ahadipour; A. R. Keshavarz-Haddad

Volume 9, Issue 1 , Winter and Spring 2017, , Pages 27-39


  Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios ...  Read More

78. Classification of encrypted traffic for applications based on statistical features

A. fanian; E. Mahdavi; H. Hassannejad

Volume 10, Issue 1 , Winter and Spring 2018, , Pages 29-43


  Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like ...  Read More

79. A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

M. Saniee Abadeh; J. Habibi

Volume 2, Issue 1 , Winter and Spring 2010, , Pages 33-46


  A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network ...  Read More

80. A centralized privacy-preserving framework for online social networks

F. Raji; A. Miri; M. Davarpanah Jazi

Volume 6, Issue 1 , Winter and Spring 2014, , Pages 35-52


  There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically ...  Read More

81. Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Akbar Mahmoodi Rishakani; Mohammad Reza Mirzaee Shamsabad; S. M. Dehnavi; Mohammad Amin Amiri; Hamidreza Maimani; Nasour Bagheri

Volume 11, Issue 1 , Winter and Spring 2019, , Pages 35-46


  Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic ...  Read More

82. Improved Univariate Microaggregation for Integer Values

Reza Mortazavi

Volume 12, Issue 1 , Winter and Spring 2020, , Pages 35-43


  Privacy issues during data publishing is an increasing concern of involved entities. The problem is addressed in the field of statistical disclosure control with the aim of producing protected datasets that are also useful for interested end users such as government agencies and research communities. ...  Read More

83. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

F. Aminmansour; H. R. Shahriari

Volume 8, Issue 1 , Winter and Spring 2016, , Pages 39-52


  Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard ...  Read More

84. Double voter perceptible blind signature based electronic voting protocol

Y. Baseri; A. Mortazavi; M. Rajabzadeh Asaar; M. Pourpouneh; J. Mohajeri

Volume 3, Issue 1 , Winter and Spring 2011, , Pages 43-50


  Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill ...  Read More

85. Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

M. Sabzinejad Farash; M. Ahmadian Attari

Volume 5, Issue 1 , Winter and Spring 2013, , Pages 55-70


  Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public ...  Read More

86. A model for specification, composition and verification of access control policies and its application to web services

Z. Derakhshandeh; B. Tork Ladani

Volume 3, Issue 2 , Summer and Autumn 2011, , Pages 103-120


  Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access ...  Read More

87. Image flip CAPTCHA

M. Tariq Banday; N. A. Shah

Volume 1, Issue 2 , Summer and Autumn 2009, , Pages 105-123


  The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) ...  Read More

88. High capacity steganography tool for Arabic text using 'Kashida'

A. Abdul-Aziz Gutub; A. A. Al-Nazer

Volume 2, Issue 2 , Summer and Autumn 2010, , Pages 107-118


  Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide ...  Read More

89. Distributed Contingency Logic and Security

R. Ramezanian

Volume 10, Issue 2 , Summer and Autumn 2018, , Pages 107-115


  In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper ...  Read More

90. Improving security of double random phase encoding with chaos theory using fractal images

M. Taheri; S. Mozaffari

Volume 4, Issue 2 , Summer and Autumn 2012, , Pages 115-124


  This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. ...  Read More

91. EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

R. Ebrahimi Atani; Sh. Ebrahimi Atani; A. Hassani Karbasi

Volume 7, Issue 2 , Summer and Autumn 2015, , Pages 115-126


  GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public ...  Read More

92. A novel key management scheme for heterogeneous sensor networks based on the position of nodes

T. Y. Rezapour; R. Ebrahimi Atani; M. S. Abolghasemi

Volume 8, Issue 2 , Summer and Autumn 2016, , Pages 115-130


  Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless ...  Read More

93. A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study

M. Safaei Pour; M. Salmasizadeh

Volume 9, Issue 2 , Summer and Autumn 2017, , Pages 119-130


  In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON ...  Read More

94. Relaxed Differential Fault Analysis of SHA-3

S.Ehsan Hosiny Nezhad; Masoumeh Safkhani; Nasour Bagheri

Volume 11, Issue 2 , Summer and Autumn 2019, , Pages 129-143


  In this paper, we propose a new method of differential fault analysis of SHA-3 which is based on the differential relations of the algorithm. Employing those differential relations in the fault analysis of SHA-3 gives new features to the proposed attacks, e.g., the high probability of fault detection ...  Read More

95. An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

A. fanian; F. Alamifar; M. Berenjkoub

Volume 6, Issue 2 , Summer and Autumn 2014, , Pages 141-153


  The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast ...  Read More

96. GTrust: a group based trust model

M. Ezhei; B. Tork Ladani

Volume 5, Issue 2 , Summer and Autumn 2013, , Pages 155-170


  Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this ...  Read More

97. Medical Image Compression Based on Region of Interest

Dalia Shaaban; Mohamed Saad; Ahmed Madian; Hesham Elmahdy

Volume 11, Issue 3 , Summer and Autumn 2019, , Pages 29-34


  Medical images show a great interest since it is needed in various medical applications. In order to decrease the size of medical images which are needed to be transmitted in a faster way; Region of Interest (ROI) and hybrid lossless compression techniques are applied on medical images ...  Read More

98. CAMAC: a context-aware mandatory access control model

J. H. Jafarian; M. Amini

Volume 1, Issue 1 , Winter and Spring 2009, , Pages 35-54


  Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security ...  Read More

99. Private Key based query on encrypted data

H. Afzali; H. Nemati; R. Azmi

Volume 4, Issue 1 , Winter and Spring 2012, , Pages 41-50


  Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data ...  Read More

100. A new security proof for FMNV continuous non-malleable encoding scheme

A. Mortazavi; M. Salmasizadeh; A. Daneshgar

Volume 9, Issue 1 , Winter and Spring 2017, , Pages 41-51


  A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting ...  Read More