Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
REVIEW PAPER
2. A risk model for cloud processes

E. Damiani; S. Cimato; G. Gianini

Volume 6, Issue 2 , Summer and Autumn 2014, Pages 99-123

http://dx.doi.org/10.22042/isecure.2015.6.2.2

Abstract
  Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to ...  Read More

ORIGINAL RESEARCH PAPER
3. Artemia: a family of provably secure authenticated encryption schemes

J. Alizadeh; M. R. Aref; N. Bagheri

Volume 6, Issue 2 , Summer and Autumn 2014, Pages 125-139

http://dx.doi.org/10.22042/isecure.2015.6.2.3

Abstract
  Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, ...  Read More

ORIGINAL RESEARCH PAPER
4. An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

A. fanian; F. Alamifar; M. Berenjkoub

Volume 6, Issue 2 , Summer and Autumn 2014, Pages 141-153

http://dx.doi.org/10.22042/isecure.2015.6.2.4

Abstract
  The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast ...  Read More

ORIGINAL RESEARCH PAPER
5. A hybrid approach for database intrusion detection at transaction and inter-transaction levels

M. Doroudian; H. R. Shahriari

Volume 6, Issue 2 , Summer and Autumn 2014, Pages 155-167

http://dx.doi.org/10.22042/isecure.2015.6.2.5

Abstract
  Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases ...  Read More

ORIGINAL RESEARCH PAPER
6. An extended feature set for blind image steganalysis in contourlet domain

E. Shakeri; Sh. Ghaemmaghami

Volume 6, Issue 2 , Summer and Autumn 2014, Pages 169-181

http://dx.doi.org/10.22042/isecure.2014.6.2.6

Abstract
  The aim of image steganalysis is to detect the presence of hidden messages in stego images. We propose a blind image steganalysis method in Contourlet domain and then show that the embedding process changes statistics of Contourlet coefficients. The suspicious image is transformed into Contourlet space, ...  Read More

ORIGINAL RESEARCH PAPER
7. A two-phase wormhole attack detection scheme in MANETs

Sh. Shamaei; A. Movaghar

Volume 6, Issue 2 , Summer and Autumn 2014, Pages 183-191

http://dx.doi.org/10.22042/isecure.2015.6.2.7

Abstract
  Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols ...  Read More