Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 2 (2010)
Volume 1 (2009)
Review Article
Computer security in the future

M. Bishop

Volume 3, Issue 1 , January 2011, Pages 3-27

https://doi.org/10.22042/isecure.2015.3.1.2

Abstract
  Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who ...  Read More

Research Article
QTRU: quaternionic version of the NTRU public-key cryptosystems

E. Malekian; A. Zakerolhosseini; A. Mashatan

Volume 3, Issue 1 , January 2011, Pages 29-42

https://doi.org/10.22042/isecure.2015.3.1.3

Abstract
  In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as ...  Read More

Research Article
Double voter perceptible blind signature based electronic voting protocol

Y. Baseri; A. Mortazavi; M. Rajabzadeh Asaar; M. Pourpouneh; J. Mohajeri

Volume 3, Issue 1 , January 2011, Pages 43-50

https://doi.org/10.22042/isecure.2015.3.1.4

Abstract
  Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill ...  Read More

Research Article
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

M. Deljavan Amiri; H. Danyali; B. Zahir-Azami

Volume 3, Issue 1 , January 2011, Pages 51-66

https://doi.org/10.22042/isecure.2015.3.1.5

Abstract
  Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm ...  Read More