Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Research Article
2. ASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow

Sh. Zamanzadeh; A. Jahanian

Volume 8, Issue 2 , Summer and Autumn 2016, Pages 93-104

http://dx.doi.org/10.22042/isecure.2016.8.2.1

Abstract
  Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist ...  Read More

Research Article
3. Traceability improvements of a new RFID protocol based on EPC C1 G2

S. Sajjadi Ghaemmaghami; A. Haghbin; M. Mirmohseni

Volume 8, Issue 2 , Summer and Autumn 2016, Pages 105-114

http://dx.doi.org/10.22042/isecure.2016.8.2.2

Abstract
  Radio Frequency Identification (RFID) applications have spread all over the world. In order to provide their security and privacy, researchers proposed different kinds of protocols. In this paper, we analyze the privacy of a new protocol, proposed by Yu-Jehn in 2015 which is based on Electronic Product ...  Read More

Research Article
4. A novel key management scheme for heterogeneous sensor networks based on the position of nodes

T. Y. Rezapour; R. Ebrahimi Atani; M. S. Abolghasemi

Volume 8, Issue 2 , Summer and Autumn 2016, Pages 115-130

http://dx.doi.org/10.22042/isecure.2016.8.2.3

Abstract
  Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless ...  Read More

Research Article
5. Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling

N. Zarmehi; M. R. Aref

Volume 8, Issue 2 , Summer and Autumn 2016, Pages 131-139

http://dx.doi.org/10.22042/isecure.2016.8.2.4

Abstract
  This paper investigates the multiplicative spread spectrum watermarking method for the image. The information bit is spreaded into middle-frequency Discrete Cosine Transform (DCT) coefficients of each block of an image using a generated pseudo-random sequence. Unlike the conventional signal modeling, ...  Read More

Research Article
6. Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

A. Sedaghatbaf; M. Abdollahi Azgomi

Volume 8, Issue 2 , Summer and Autumn 2016, Pages 141-153

http://dx.doi.org/10.22042/isecure.2016.8.2.5

Abstract
  Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, ...  Read More

Research Article
7. A note on the security of two improved RFID protocols

M. Safkhani; N. Bagheri

Volume 8, Issue 2 , Summer and Autumn 2016, Pages 155-160

http://dx.doi.org/10.22042/isecure.2016.8.2.6

Abstract
  Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version ...  Read More