Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Research Article
2. A TESLA-based mutual authentication protocol for GSM networks

A. Fanian; M. Berenjkoub; T. A. Gulliver

Volume 1, Issue 1 , Winter and Spring 2009, Pages 3-15


  The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated ...  Read More

Research Article
3. Steganalysis of embedding in difference of image pixel pairs by neural network

V. Sabeti; Sh. Samavi; M. Mahdavi; Sh. Shirani

Volume 1, Issue 1 , Winter and Spring 2009, Pages 17-26


  In this paper a steganalysis method is proposed for pixel value differencing method. This steganographic method, which has been immune against conventional attacks, performs the embedding in the difference of the values of pixel pairs. Therefore, the histogram of the differences of an embedded image ...  Read More

Research Article
4. A collusion attack on the fuzzy vault scheme

H. T. Poon; A. Miri

Volume 1, Issue 1 , Winter and Spring 2009, Pages 27-34


  The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that ...  Read More

Research Article
5. CAMAC: a context-aware mandatory access control model

J. H. Jafarian; M. Amini

Volume 1, Issue 1 , Winter and Spring 2009, Pages 35-54


  Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security ...  Read More

Research Article
6. Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

R. Ramezanian

Volume 1, Issue 1 , Winter and Spring 2009, Pages 55-67


  Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role ...  Read More