Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Review Article
2. A Survey of Anomaly Detection Approaches in Internet of Things

M. Behniafar; A.R. Nowroozi; H.R. Shahriari

Volume 10, Issue 2 , Summer and Autumn 2018, Pages 79-92


  Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion ...  Read More

Research Article
3. Impossible Differential Cryptanalysis on Deoxys-BC-256

F. Moazami; A.R. Mehrdad; H. Soleimany

Volume 10, Issue 2 , Summer and Autumn 2018, Pages 93-105


  Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 ...  Read More

Research Article
4. Distributed Contingency Logic and Security

R. Ramezanian

Volume 10, Issue 2 , Summer and Autumn 2018, Pages 107-115


  In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper ...  Read More

Research Article
5. On the Security of O-PSI: A Delegated Private Set Intersection on Outsourced Datasets (Extended Version)

M. Mahdavi Oliaee; M. Delavar; M.H. Ameri; J. Mohajeri; M.R. Aref

Volume 10, Issue 2 , Summer and Autumn 2018, Pages 117-127


  In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private Set Intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties ...  Read More

Research Article
6. Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

N. Soltani; R. Bohlooli; R. Jalili

Volume 10, Issue 2 , Summer and Autumn 2018, Pages 129-139


  One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings ...  Read More

Research Article
7. Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

D. Patil; J. Patil

Volume 10, Issue 2 , Summer and Autumn 2018, Pages 141-162


  Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking. Existing approaches have focused on binary detection i.e., either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, ...  Read More