Volume 12 (2020)
Volume 11 (2019)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
REVIEW PAPER
2. A Survey of Anomaly Detection Approaches in Internet of Things

M. Behniafar; A.R. Nowroozi; H.R. Shahriari

Volume 10, Issue 2 , Summer and Autumn 2018, Pages 79-92

http://dx.doi.org/10.22042/isecure.2018.116976.408

Abstract
  Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion ...  Read More

ORIGINAL RESEARCH PAPER
3. Impossible Differential Cryptanalysis on Deoxys-BC-256

F. Moazami; A.R. Mehrdad; H. Soleimany

Volume 10, Issue 2 , Summer and Autumn 2018, Pages 93-105

http://dx.doi.org/10.22042/isecure.2018.114245.405

Abstract
  Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 ...  Read More

ORIGINAL RESEARCH PAPER
4. Distributed Contingency Logic and Security

R. Ramezanian

Volume 10, Issue 2 , Summer and Autumn 2018, Pages 107-115

http://dx.doi.org/10.22042/isecure.2018.114354.406

Abstract
  In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper ...  Read More

ORIGINAL RESEARCH PAPER
5. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

M. Mahdavi Oliaee; M. Delavar; M.H. Ameri; J. Mohajeri; M.R. Aref

Volume 10, Issue 2 , Summer and Autumn 2018, Pages 117-127

http://dx.doi.org/10.22042/isecure.2018.120860.410

Abstract
  In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private Set Intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties ...  Read More

ORIGINAL RESEARCH PAPER
6. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

N. Soltani; R. Bohlooli; R. Jalili

Volume 10, Issue 2 , Summer and Autumn 2018, Pages 129-139

http://dx.doi.org/10.22042/isecure.2018.126294.414

Abstract
  One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings ...  Read More

ORIGINAL RESEARCH PAPER
7. Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

D. Patil; J. Patil

Volume 10, Issue 2 , Summer and Autumn 2018, Pages 141-162

http://dx.doi.org/10.22042/isecure.2018.0.0.1

Abstract
  Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking. Existing approaches have focused on binary detection i.e., either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, ...  Read More