Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
ORIGINAL RESEARCH PAPER
2. Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes

R. Hooshmand; T. Eghlidos; M. R. Aref

Volume 4, Issue 1 , Winter and Spring 2012, Pages 3-14

http://dx.doi.org/10.22042/isecure.2015.4.1.2

Abstract
  This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem decreases up to 85 percent using a new efficient compression algorithm. Cryptanalytic ...  Read More

ORIGINAL RESEARCH PAPER
3. On the multi _ chi-square tests and their data complexity

A. Vardasbi; M. Salmasizadeh; J. Mohajeri

Volume 4, Issue 1 , Winter and Spring 2012, Pages 15-24

http://dx.doi.org/10.22042/isecure.2015.4.1.3

Abstract
  Chi-square tests are generally used for distinguishing purposes; however when they are combined to simultaneously test several independent variables, extra notation is required. In this study, the chi-square statistics in some previous works is revealed to be computed half of its real value. Therefore, ...  Read More

ORIGINAL RESEARCH PAPER
4. BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

F. Barani; M. Abadi

Volume 4, Issue 1 , Winter and Spring 2012, Pages 25-39

http://dx.doi.org/10.22042/isecure.2015.4.1.4

Abstract
  Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such ...  Read More

ORIGINAL RESEARCH PAPER
5. Private Key based query on encrypted data

H. Afzali; H. Nemati; R. Azmi

Volume 4, Issue 1 , Winter and Spring 2012, Pages 41-50

http://dx.doi.org/10.22042/isecure.2015.4.1.5

Abstract
  Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data ...  Read More

ORIGINAL RESEARCH PAPER
6. BotOnus: an online unsupervised method for Botnet detection

M. Yahyazadeh; M. Abadi

Volume 4, Issue 1 , Winter and Spring 2012, Pages 51-62

http://dx.doi.org/10.22042/isecure.2015.4.1.6

Abstract
  Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, ...  Read More

ORIGINAL RESEARCH PAPER
7. SEIMCHA: a new semantic image CAPTCHA using geometric transformations

M. Mehrnejad; A. Ghaemi Bafghi; A. Harati; E. Toreini

Volume 4, Issue 1 , Winter and Spring 2012, Pages 63-76

http://dx.doi.org/10.22042/isecure.2015.4.1.7

Abstract
  As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing ...  Read More

ORIGINAL RESEARCH PAPER
8. A chaos-based video watermarking algorithm

S. Mohammadi; A. Hakimi

Volume 4, Issue 1 , Winter and Spring 2012, Pages 77-86

http://dx.doi.org/10.22042/isecure.2015.4.1.8

Abstract
  The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential ...  Read More