Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)

STLR: a novel danger theory based structural TLR algorithm

R. Azmi; B. Pishgoo

Volume 5, Issue 2 , July 2013, , Pages 209-225

https://doi.org/10.22042/isecure.2014.5.2.7

Abstract
  Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called ...  Read More

Reverse Engineering of Authentication Protocol in DesFire

Mansoureh Labbafniya; Hamed Yusefi; Akram Khalesi

Volume 15, Issue 2 , July 2023, , Pages 254-259

https://doi.org/10.22042/isecure.2023.371284.889

Abstract
  Nowadays contactless smart cards are extensively used in applications that need strong authentication and security feature protection. Among different cards from different companies, MIFARE DESFire cards are one of the most used cases. The hardware and software design in addition to implementation details ...  Read More

Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic (MFL)

Areej Fatima; Muhammad Adnan Khan; Sagheer Abbas; Muhammad Waqas; Leena Anum; Muhammad Asif

Volume 11, Issue 3 , August 2019, , Pages 51-58

https://doi.org/10.22042/isecure.2019.11.0.7

Abstract
  Internet of Things (IoT) approach is empowering smart city creativities all over the world. There is no specific tool or criteria for the evaluation of the services offered by the smart city. In this paper, a new Multilayer Fuzzy Inference System (MFIS) is proposed for the assessment of ...  Read More

A Chaos-Based Video Watermarking Algorithm

S. Mohammadi; A. Hakimi

Volume 4, Issue 1 , January 2012, , Pages 77-86

https://doi.org/10.22042/isecure.2015.4.1.8

Abstract
  The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential ...  Read More

A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis

Mahdieh Abazar; Peyman Masjedi; Mohammad Taheri

Volume 14, Issue 1 , January 2022, , Pages 105-113

https://doi.org/10.22042/isecure.2021.262990.596

Abstract
  Steganalysis is an interesting classification problem to discriminate the images, including hidden messages from the clean ones. There are many methods, including deep CNN networks, to extract fine features for this classification task. Also, some researches have been conducted to improve the final classifier. ...  Read More

Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers

Bahram Rashidi

Volume 15, Issue 1 , January 2023, , Pages 137-151

https://doi.org/10.22042/isecure.2022.275268.646

Abstract
  In this paper, we present four low-cost substitution boxes (S-boxes) including two 4-bit S-boxes called S1 and S2 and two 8-bit S-boxes called SB1 and SB2, which are suitable for the development of lightweight block ciphers. The 8-bit SB1 S-box is constructed based on four 4-bit S-boxes, multiplication ...  Read More

Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network

Zeinab Salami; Mahmoud Ahmadian Attari; Mohammad Reza Aref; Hoda Jannati

Volume 14, Issue 2 , July 2022, , Pages 215-227

https://doi.org/10.22042/isecure.2022.243102.568

Abstract
  Since their introduction, cognitive radio networks, as a new solution to the problem of spectrum scarcity, have received great attention from the research society. An important field in database driven cognitive radio network studies is pivoted on their security issues. A critical issue in this context ...  Read More

Oblivious Transfer Using Generalized Jacobian of Elliptic Curves

Maryam Rezaei Kashi; Mojtaba Bahramian

Volume 15, Issue 2 , July 2023, , Pages 260-273

https://doi.org/10.22042/isecure.2023.336301.779

Abstract
  ‎Oblivious transfer is one of the important tools in cryptography‎, ‎in which a sender sends a message to a receiver with a probability between 0 and 1‎, ‎while the sender remains oblivious that the receiver has received the message‎.‎A flavor of $OT$ schemes is chosen $t$-out-of-$k$ ...  Read More

Considering Uncertainty in Modeling Historical Knowledge

Fairouz Zendaoui; Walid Khaled Hidouci

Volume 11, Issue 3 , August 2019, , Pages 59-65

https://doi.org/10.22042/isecure.2019.11.0.8

Abstract
  Simplifying and structuring qualitatively complex knowledge, quantifying it in a certain way to make it reusable and easily accessible are all aspects that are not new to historians. Computer science is currently approaching a solution to some of these problems, or at least making it easier ...  Read More