Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 2 (2010)
Volume 1 (2009)
REVIEW PAPER
2. Computer security in the future

M. Bishop

Volume 3, Issue 1 , Winter and Spring 2011, Pages 3-27

http://dx.doi.org/10.22042/isecure.2015.3.1.2

Abstract
  Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who ...  Read More

ORIGINAL RESEARCH PAPER
3. QTRU: quaternionic version of the NTRU public-key cryptosystems

E. Malekian; A. Zakerolhosseini; A. Mashatan

Volume 3, Issue 1 , Winter and Spring 2011, Pages 29-42

http://dx.doi.org/10.22042/isecure.2015.3.1.3

Abstract
  In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as ...  Read More

ORIGINAL RESEARCH PAPER
4. Double voter perceptible blind signature based electronic voting protocol

Y. Baseri; A. Mortazavi; M. Rajabzadeh Asaar; M. Pourpouneh; J. Mohajeri

Volume 3, Issue 1 , Winter and Spring 2011, Pages 43-50

http://dx.doi.org/10.22042/isecure.2015.3.1.4

Abstract
  Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill ...  Read More

ORIGINAL RESEARCH PAPER
5. Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

M. Deljavan Amiri; H. Danyali; B. Zahir-Azami

Volume 3, Issue 1 , Winter and Spring 2011, Pages 51-66

http://dx.doi.org/10.22042/isecure.2015.3.1.5

Abstract
  Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm ...  Read More