Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 1 (2009)
Review Article
2. Authorization models for secure information sharing: a survey and research agenda

F. Salim; J. Reid; E. Dawson

Volume 2, Issue 2 , Summer and Autumn 2010, Pages 69-87

http://dx.doi.org/10.22042/isecure.2015.2.2.2

Abstract
  This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency ...  Read More

Research Article
3. An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

A. Fanian; M. Berenjkoub; H. Saidi; T. A. Gulliver

Volume 2, Issue 2 , Summer and Autumn 2010, Pages 89-105

http://dx.doi.org/10.22042/isecure.2015.2.2.3

Abstract
  An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have ...  Read More

Research Article
4. High capacity steganography tool for Arabic text using 'Kashida'

A. Abdul-Aziz Gutub; A. A. Al-Nazer

Volume 2, Issue 2 , Summer and Autumn 2010, Pages 107-118

http://dx.doi.org/10.22042/isecure.2015.2.2.4

Abstract
  Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide ...  Read More

Research Article
5. Detection of perturbed quantization (PQ) steganography based on empirical matrix

M. Abolghasemi; H. Aghaeinia; K. Faez

Volume 2, Issue 2 , Summer and Autumn 2010, Pages 119-128

http://dx.doi.org/10.22042/isecure.2015.2.2.5

Abstract
  Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower ...  Read More