Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
ORIGINAL RESEARCH PAPER
2. A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

M. Pourpouneh; R. Ramezanian

Volume 8, Issue 1 , Winter and Spring 2016, Pages 3-24

http://dx.doi.org/10.22042/isecure.2016.8.1.1

Abstract
  In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in ...  Read More

ORIGINAL RESEARCH PAPER
3. On the design and security of a lattice-based threshold secret sharing scheme

H. R. Amini Khorasgani; S. Asaad; H. Pilaram; T. Eghlidos; M. R. Aref

Volume 8, Issue 1 , Winter and Spring 2016, Pages 25-38

http://dx.doi.org/10.22042/isecure.2016.8.1.2

Abstract
  In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. ...  Read More

ORIGINAL RESEARCH PAPER
4. Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

F. Aminmansour; H. R. Shahriari

Volume 8, Issue 1 , Winter and Spring 2016, Pages 39-52

http://dx.doi.org/10.22042/isecure.2016.8.1.6

Abstract
  Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard ...  Read More

ORIGINAL RESEARCH PAPER
5. Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose

Sh. Zamanzadeh; A. Jahanian

Volume 8, Issue 1 , Winter and Spring 2016, Pages 53-60

http://dx.doi.org/10.22042/isecure.2016.8.1.3

Abstract
  FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs ...  Read More

ORIGINAL RESEARCH PAPER
6. Unauthenticated event detection in wireless sensor networks using sensors co-coverage

M. Kamarei; A. Patooghy; M. Fazeli

Volume 8, Issue 1 , Winter and Spring 2016, Pages 61-71

http://dx.doi.org/10.22042/isecure.2016.8.1.4

Abstract
  Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN ...  Read More

ORIGINAL RESEARCH PAPER
7. A new method for accelerating impossible differential cryptanalysis and its application on LBlock

A. Khalesi; H. Bahramgiri; D. Mansuri

Volume 8, Issue 1 , Winter and Spring 2016, Pages 73-84

http://dx.doi.org/10.22042/isecure.2016.8.1.5

Abstract
  Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early ...  Read More