Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
A traceable optimistic fair exchange protocol in the standard model

R. Ganjavi; M. Rajabzadeh Asaar; M. Salmasizadeh

Volume 7, Issue 1 , January 2015, Pages 3-14

https://doi.org/10.22042/isecure.2015.7.1.2

Abstract
  An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, ...  Read More

Research Article
A novel local search method for microaggregation

R. Mortazavi; S. Jalili

Volume 7, Issue 1 , January 2015, Pages 15-26

https://doi.org/10.22042/isecure.2015.7.1.3

Abstract
  In this paper, we propose an effective microaggregation algorithm to produce a more useful protected data for publishing. Microaggregation is mapped to a clustering problem with known minimum and maximum group size constraints. In this scheme, the goal is to cluster n records into groups of at least ...  Read More

Research Article
A combination of semantic and attribute-based access control model for virtual organizations

M. Amini; M. Arasteh

Volume 7, Issue 1 , January 2015, Pages 27-45

https://doi.org/10.22042/isecure.2015.7.1.4

Abstract
  A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which ...  Read More

Research Article
Optimizing image steganography by combining the GA and ICA

F. Sadeghi; F. Zarisfi Kermani; M. Kuchaki Rafsanjani

Volume 7, Issue 1 , January 2015, Pages 47-58

https://doi.org/10.22042/isecure.2015.7.1.5

Abstract
  In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded ...  Read More

Research Article
GGRA: a grouped gossip-based reputation aggregation algorithm

S. Ghasemi Falavarjani; Behrouz Tork Ladani; S. Ghasemi

Volume 7, Issue 1 , January 2015, Pages 59-74

https://doi.org/10.22042/isecure.2015.7.1.6

Abstract
  An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting ...  Read More

Research Article
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability

M. Vosoughi; A. Jahanian

Volume 7, Issue 1 , January 2015, Pages 75-81

https://doi.org/10.22042/isecure.2015.7.1.7

Abstract
  Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore ...  Read More